Threat Landscape Report - The 10 Years Edition

In 2011 two things happened: CERT-EU was born and RSA, a renowned cybersecurity vendor, was hacked.
If history is a great teacher, then we should definitely look back at the major cyber events that made the headlines in the ten years since 2011, since we were created ...

CERT-EU - Threat Landscape Report - The 10 Years Edition - Main map
Click on each event to travel back in time

2011

RSA hacked

2012

Shamoon

2013

Iran's Mabna
Institute targets
universities

2014

Sony Pictures
hacked

2015

China's military
cyber forces
established

2016

The Shadow Brokers

2017

WannaCry

2018

Sandworm

2019

Ransomware
double extortion

2020

SolarWinds
by APT29

2021

Log4Shell

CERT-EU - Threat Landscape Report - The 10 Years Edition - Quarter background CERT-EU - Threat Landscape Report - The 10 Years Edition - Go back

2011

CERT-EU - Threat Landscape Report - The 10 Years Edition - Year 2011 - route
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2011 - RSA hacked

RSA hacked

RSA, a renowned cybersecurity vendor, announced that its network had been hacked by an APT (Advanced Persistent Threat) actor on March 17. RSA makes the SecurID two-factor authentication mechanism. SecurID is used by governments, intelligence agencies, defence contractors, etc.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2011 - Lockheed Martin hacked via RSA

Lockheed Martin
hacked via RSA

On May 28, Lockheed Martin announced it was hit by attackers using the stolen SecurID codes compromised in the RSA hack. The defence contractor said no data was compromised.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2011 - Blackhole exploit kit

Blackhole exploit kit

29% of all web threats were due to the Blackhole exploit kit, fielded by multiple threat actors.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2011 - Gmail accounts of US politicians hacked

Gmail accounts of
US politicians hacked

On June 2, Google announced that the Gmail accounts of some members of the US government had been compromised by Chinese hackers.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2011 - Belgacom hack

Belgacom
hack

Belgacom, the precursor of today’s Belgian ISP and telecom company Proximus, was reportedly compromised by the British surveillance agency GCHQ. This allowed the GCHQ to intercept communications of individual subscribers and also clients of Belgacom’s partner telecoms.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2011 - IMF compromise

IMF compromise

On June 11, the International Monetary Fund publicly announced it had been the target of an extremely sophisticated cyber attack. It is not clear how seriously IMF was compromised.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2011 - Blackhole exploit kit

Backdoored
Chinese
equipment

Vodafone discovered hidden backdoors in Huawei-made home routers and optical service nodes in 2011 and 2012. At that time, Vodafone notified Huawei and the issues were resolved.
CERT-EU - Threat Landscape Report - The 10 Years Edition - Quarter background CERT-EU - Threat Landscape Report - The 10 Years Edition - Go back

2012

CERT-EU - Threat Landscape Report - The 10 Years Edition - Year 2012 - route
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2012 - China Chopper

China Chopper

China Chopper is a tiny web shell used by several Chinese APT (Advanced Persistent Threat) groups since 2012. It was and still is very popular. Hafnium used a rewrite of the program to conduct the 2021 Microsoft Exchange data breaches.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2012 - Flame

Flame

Flame, a complex, advanced, and complete cyber espionage toolkit was discovered operating in Iran. Public sources attribute Flame to the US and Israel.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2012 - Shamoon

Shamoon

Shamoon, a destructive virus of Iranian origin, was used as a cyber weapon against Saudi Aramco workstations. The virus is somewhat similar to Flame and caused a week-long outage.
CERT-EU - Threat Landscape Report - The 10 Years Edition - Quarter background CERT-EU - Threat Landscape Report - The 10 Years Edition - Go back

2013

CERT-EU - Threat Landscape Report - The 10 Years Edition - Year 2013 - route
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2013 - Red October

Red October

On Jan 14, Kaspersky, a cybersecurity company, released a public report on a cyber espionage campaign against diplomatic targets. The campaign lasted from at least 2007 until 2012.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2013 - CryptoLocker, the pioneer

CryptoLocker,
the pioneer

CryptoLocker, a new ransomware specimen, emerged. CryptoLocker hijacked the documents of its victims, demanding a ransom for their release. This was a new and ingenious way used by cybercriminals for making money.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2013 - Iran’s Mabna Institute begins targeting universities

Iran’s Mabna
Institute begins
targeting universities

The Mabna Institute, an Iranian company that conducts state-sponsored cyber intrusions for the Revolutionary Guards, started to target universities and other research entities in Europe and the US. In 2018, the US indicted nine members of the Mabna Institute.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2013 - Ke3chang launches a major campaign

Ke3chang launches
a major campaign

As the crisis in Syria escalated in 2013, researchers discovered a cyber espionage campaign which they called Ke3chang. Since then, Ke3chang has been conducting regular cyber intrusion campaigns in Europe and elsewhere.
CERT-EU - Threat Landscape Report - The 10 Years Edition - Quarter background CERT-EU - Threat Landscape Report - The 10 Years Edition - Go back

2014

CERT-EU - Threat Landscape Report - The 10 Years Edition - Year 2014 - route
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2014 - Gamma Group hacked

Gamma Group
hacked

In 2014, a hacker named Phineas Fisher breached Gamma Group. Phineas Fisher released a 40 GB dump, containing Gamma’s client and price lists, software source code, details about the effectiveness of the FinFisher malware, user and support documentation, a list of classes and tutorials, and much more.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2014 - Evil Corp emerges

Evil Corp emerges

First observed in 2014, the Evil Corp (a.k.a. TA505, Russian criminal hackers) is responsible for large malicious spam campaigns, massively distributing instances of the Dridex banking trojan, Locky ransomware, Jaff ransomware, the Trick banking trojan, and several others.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2014 - Dridex banking trojan emerges

Dridex banking
trojan emerges

Dridex is a sophisticated banking trojan, successor to Cridex and similar to the infamous Zeus malware. Its core functionality is to steal credentials of online banking websites and allow a criminal to use those credentials to initiate transfers and steal funds. Dridex became very successful over time.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2014 - Syrian Electronic Army surfaces

Syrian Electronic
Army surfaces

The Syrian Electronic Army targeted social media accounts of various news outlets that it believed were publishing pro-Syrian rebel stories, including the New York Times, the Financial Times, the Guardian, the BBC and even The Onion.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2014 - Ke3chang emerges

Korea Hydro hacked

In December 2014, Korea Hydro & Nuclear Power Co., Ltd., which runs South Korea’s 23 nuclear reactors, was hacked and South Korea blamed North Korea for these cyberattacks.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2014 - Sony Pictures hacked, films and data leaked

Sony Pictures hacked,
films and data leaked

On November 24, a hacker group identifying itself as “Guardians of Peace” leaked confidential data from the Sony Pictures Entertainment studio. The data included personal information about the studio’s employees and their families, email messages, executive salaries, copies of then-unreleased Sony films, plans for future Sony films, scripts for certain films, and other information.
CERT-EU - Threat Landscape Report - The 10 Years Edition - Quarter background CERT-EU - Threat Landscape Report - The 10 Years Edition - Go back

2015

CERT-EU - Threat Landscape Report - The 10 Years Edition - Year 2015 - route
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2015 - Hacking Team hacked

Hacking Team hacked

Hacking Team, a cyber intrusion and surveillance company, was hacked and several vulnerabilities and exploits in their arsenal were disclosed.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2015 - China-US no-hack agreement

China-US no-hack agreement

According to the US White House, the United States and China agreed that neither country’s government will conduct or knowingly support cyber-enabled theft of intellectual property.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2015 - Ukraine’s power grid targeted

Ukraine’s power grid targeted

A December 2015 cyber attack affected multiple regional electrical power companies in Ukraine. It included multiple elements: disconnection of electricity substations, denial of access to system dispatchers and attempts to deny customer calls that would have reported the power downtime. Beyond the Ivano-Frankivsk region, three other regions were attacked (Chernivtsi, Khmelnytskyi, Kyiv).
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2015 - China’s military cyber forces established

China’s military
cyber forces
established

China’s PLA Strategic Support Forces is created. This is the space, cyber, and electronic warfare force and the 5th branch of China’s People’s Liberation Army.
CERT-EU - Threat Landscape Report - The 10 Years Edition - Quarter background CERT-EU - Threat Landscape Report - The 10 Years Edition - Go back

2016

CERT-EU - Threat Landscape Report - The 10 Years Edition - Year 2016 - route
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2016 - Bangladesh Bank SWIFT money heist

Bangladesh Bank
SWIFT money heist

North Korea’s Lazarus managed to steal $81M from the Bangladesh Bank by abusing the SWIFT financial transaction network.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2016 - United Cyber Caliphate created

United Cyber Caliphate created

A United Cyber Caliphate was created, following the merger of several groups, including Ghost Caliphate, Sons Caliphate Army, Caliphate Cyber Army, and Kalashnikov Team. The level of cyber threat posed by jihadists remained low as attacks essentially consisted in defacements and doxing (publishing a target’s personal information with “invitation to kill” to inspire lone-wolf type of actors).
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2016 - Tainted leaks and Guccifer

Tainted leaks
and Guccifer

From summer 2015 to June 2016, Russia’s APT28 and APT29 cyber threat groups conducted operations against the US Democratic National Committee. An online persona known as Guccifer 2.0 leaked data stolen in these intrusions. Guccifer 2.0 “tainted” some of these leaks with inauthentic information. According to US indictments, Russia’s GRU spy agency is behind the Guccifer 2.0 persona.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2016 - The Shadow Brokers

The Shadow Brokers

In August, a previously unknown entity operating under the nickname The Shadow Brokers posted an archive containing malicious files allegedly coming from the Equation group. This is a nickname given to a cyber-offensive branch of the US National Security Agency.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2016 - The Mirai IoT botnet

The Mirai IoT botnet

Mirai is a piece of malware that is capable of forming large internet of things botnets by compromising consumer devices such as IP cameras and home routers. The Mirai botnet was first discovered in August 2016. Since then, some of the world’s largest and most disruptive DDoS attacks have been performed using the Mirai botnet.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2016 - Cyber Space Administration of China issues a National Cybersecurity Strategy

Cyber Space
Administration
of China issues
a National
Cybersecurity Strategy

In November, China passed a new Cyber Security Law. It requires foreign tech firms to turn over source code and software to Chinese authorities for security reviews.
CERT-EU - Threat Landscape Report - The 10 Years Edition - Quarter background CERT-EU - Threat Landscape Report - The 10 Years Edition - Go back

2017

CERT-EU - Threat Landscape Report - The 10 Years Edition - Year 2017 - route
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2017 - WikiLeaks Vault7

WikiLeaks
Vault7

WikiLeaks began to publish a series of documents, dubbed Vault7, detailing the activities and capabilities of the United States’ Central Intelligence Agency in the areas of electronic surveillance and cyber warfare.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2017 - French elections hack-and-leak

French elections
hack-and-leak

An unknown threat actor dumped thousands of documents obtained via hacking from the campaign of French presidential candidate Emmanuel Macron.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2017 - Lazarus stealing money for North Korea

Lazarus stealing money
for North Korea

A watering hole campaign hosted on financial institutes’ websites was used for targeting banks. It was active from at least October 2016 to February 2017.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2017 - DoS of Ukraine’s power grid

DoS of Ukraine’s power grid

On December 20, a pro-Russian group named Sprut claimed responsibility for an attack against the energy provider Ukrenergo. A power outage did actually happen on 17 December for one hour and fifteen minutes, affecting the northern part of Kyiv. According to Ukrenergo the outage was significant, amounting to 200 megawatts of capacity or about a fifth of Kyiv’s average energy consumption at night.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2017 - WannaCry

WannaCry

WannaCry is a piece of ransomware that propagated by leveraging the EternalBlue exploit. It spread very quickly and managed to infect systems in over 150 countries, creating widespread chaos in shutting down factories, businesses, and state institutions. In December 2017, the US and UK formally asserted that North Korea was behind the attack.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2017 - NotPetya causes chaos

NotPetya
causes chaos

Destructive ransomware dubbed NotPetya propagated in Ukraine, spread to multiple other countries and caused economic impact such as halting production and shipping in several industries. The UK, New Zealand, Canada, Australia, the United States, and the Netherlands officially attribute the NotPetya attack to Russia. Russia disputes the claim.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2017 - ShadowPad supply chain attack

ShadowPad supply
chain attack

A supply chain attack using the ShadowPad malware suite leveraged compromised software packages from NetSarang, a company specialising in connectivity solutions for large corporate networks.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2017 - KRACKing the Wi-Fi

KRACKing the Wi-Fi

A replay attack on the Wi-Fi WPA2 protocol, known as KRACK, allows an attacker to eavesdrop on Wi-Fi traffic.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2017 - Triton targeting industrial safety systems

Triton targeting
industrial safety systems

Triton, a new piece of malware was identified in a critical infrastructure organisation in the Middle East. Triton can manipulate industrial safety systems. It was likely designed by a research entity in Russia.
CERT-EU - Threat Landscape Report - The 10 Years Edition - Quarter background CERT-EU - Threat Landscape Report - The 10 Years Edition - Go back

2018

CERT-EU - Threat Landscape Report - The 10 Years Edition - Year 2018 - route
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2018 - ASUS update system compromised

ASUS update system
compromised

In 2018, a supply chain attack, dubbed ShadowHammer and attributed to Chinese group APT17, compromised the ASUS Live Update mechanism and infected about 500 000 computers with a backdoor.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2018 - Spectre and Meltdown CPU flaws

Spectre and
Meltdown
CPU flaws

Processor chip-level security flaws dubbed Meltdown and Spectre were discovered. These vulnerabilities theoretically allow attackers to intercept data that is processed on the same system, even if it belongs to other users.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2018 - APT28 targets embassies

APT28 targets embassies

Russia’s APT28 was seen spear-phishing an EU member state embassy in Moscow.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2018 - Olympic Destroyer

Olympic
Destroyer

Olympic Destroyer destructive malware hits the Winter Olympics, causing notable but limited damage, such as website and video stream outages.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2018 - China spies on Uyghurs

China spies on Uyghurs

China forced eight million Uyghurs to install a mobile app that searches mobile devices and traffic for “illegal” content and submits it to the authorities together with the user’s personal data.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2018 - VPNFilter, APT28, and football in Kyiv

VPNFilter, APT28,
and football in Kyiv

APT28 used VPNFilter, a small office and home router botnet, to conduct a cyber attack during the football Champions League final in Kyiv, according to Ukraine’s Secret Service.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2018 - Sandworm

Sandworm

Russia-based Sandworm gang executed targeted attacks against German public broadcasting services and chemical research organisations, in August 2017 and June 2018.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2018 - Lazarus stealing money for North Korea

Lazarus stealing money
for North Korea

A cyberattack attributed to North Korean Lazarus group targeted SWIFT/ATM infrastructure of the Indian Cosmos Bank, resulting in the theft of over $13.5M between 10 and 13 August.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2018 - Turkish hacktivists

Turkish hacktivists

The Turkish nationalist hacktivist group Ayyildiz Tim claimed credit for a series of social media account compromises and website defacements in the US, Italy, Germany, and other countries.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2018 - Russia’s APT28 targeting elections

Russia’s APT28
targeting
elections

In September, Microsoft disrupted an APT28 hacking campaign aimed at US midterm elections by taking over domains that were likely to be used for spear-phishing operations.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2018 - Ransomware vs Managed Service Providers

Ransomware vs
Managed Service
Providers

On Dec 24, Data Resolution, a cloud and managed services provider servicing tens of thousands of customers globally, experienced a Ryuk ransomware infection and had to shut down its systems to stop the spread.
CERT-EU - Threat Landscape Report - The 10 Years Edition - Quarter background CERT-EU - Threat Landscape Report - The 10 Years Edition - Go back

2019

CERT-EU - Threat Landscape Report - The 10 Years Edition - Year 2019 - route
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2019 - Disinformation on Facebook

Disinformation on Facebook

In two separate announcements, Facebook announced the takedown of 2632 pages, groups, and accounts linked to three distinct disinformation campaigns (operating out of Iran, Russia, Macedonia, and Kosovo) as well as dozens of accounts, pages and groups intended to “engage in hate speech and spread divisive comments on both sides of the political debate” in the UK and Romania.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2019 - Facebook “mistakes”

Facebook
“mistakes”

Facebook ’unintentionally’ uploaded 1.5 million people’s email contacts without their consent. The platform also admitted storing millions of Instagram users’ passwords in plaintext. This means that Facebook employees highly likely had access to them.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2019 - Huawei sidelined in the US

Huawei sidelined in the US

Following a US President’s Executive Order on banning “foreign adversaries”, Google suspended business with Huawei. A number of semiconductor companies such as Intel and Qualcomm also made similar announcements.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2019 - Turla targeting MS Exchange

Turla targeting
MS Exchange

Turla, a Russian threat group, targeted Microsoft Exchange email servers in the education, government, military, research, and pharmaceutical sectors in more than 40 countries.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2019 - Ransomware vs aviation

Ransomware vs aviation

ASCO Industries, a Belgium-based aeroplane parts and aviation structuring company, was hit by ransomware that shut down production in Belgium and several other countries.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2019 - Ransomware double extortion

Ransomware
double extortion

An increasing number of ransomware gangs are employing double extortion. A malware strain steals information stored on a victim’s machine. After that, the information residing on the infected device is encrypted and the attackers keep a copy. Should the victim refuse to pay the ransom, the attackers would threaten to publish the stolen information or sell it to the highest bidder. In many cases, ransomware gangs establish a dedicated leak site where they publish stolen information or advertise it for sale.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2019 - Russian cyber spies hack Iranian cyber spies

Russian cyber spies
hack Iranian cyber spies

NCSC-UK and the US NSA released an advisory stating that the Turla Russia-associated cyber threat actor had compromised the Iranian APT34 threat actor and was using its tools and infrastructure.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2019 - China removing foreign hardware

China removing
foreign hardware

Beijing issued a directive to remove all foreign computer hardware and software from all government offices and public institutions within three years.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2019 - The Great Cannon of China

The Great Cannon
of China

China has activated a powerful state operated DDoS attack tool against Hong Kong protesters. The tool, nicknamed the Great Cannon of China, utilises traffic inspection capabilities offered by the Great Firewall of China.
CERT-EU - Threat Landscape Report - The 10 Years Edition - Quarter background CERT-EU - Threat Landscape Report - The 10 Years Edition - Go back

2020

CERT-EU - Threat Landscape Report - The 10 Years Edition - Year 2020 - route
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2020 - Undersea optical cables probed

Undersea optical
cables probed

Russian agents were reportedly scouting the precise location of undersea optical internet cables off the Irish coast. Irish police sources link the agents to Russian military intelligence service GRU.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2020 - China vs global industries

China vs global
industries

The China-based APT41 threat actor carried out “one of the broadest” global cyber espionage campaigns, affecting at least 8 European countries, among others. Critical sectors like banking, defence, healthcare, oil, gas, pharmaceutics, telecoms, and transportation were targeted.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2020 - COVID-19 contact tracing

COVID-19
contact
tracing

More than 40 countries have deployed various forms of monitoring technologies (tracing apps, telecom data leveraging, surveillance devices, etc.) to curb the COVID-19 pandemic. While contact tracing is useful in curbing the spread of the disease, such technology can also be used for surveillance by unscrupulous political regimes.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2020 - Bundestag espionage

Bundestag espionage

The German authorities issued an arrest warrant for a Russian citizen in relation to the May 2015 breach of Bundestag IT systems. The activity is linked to APT28, associated with the Russian GRU intelligence agency.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2020 - Zoom woes

Zoom woes

The video conferencing platform Zoom was accused of censoring certain accounts held by users based outside China and used to discuss the 1989 Tiananmen Square massacre. The platform quickly reinstated the accounts, but the initial response highlights the issue of tech companies working in or with China.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2020 - US elections targeted

US elections
targeted

Multiple operations targeted the 2020 US elections. China, Russia, and Iran allegedly conducted these operations.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2020 - European IT giants targeted with ransomware

European IT giants
targeted with
ransomware

The cybercriminals operating the Clop and Ryuk ransomware hit two prominent IT companies: Germany’s Software AG and France’s Sopra-Steria.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2020 - European Medicines Agency breach

European
Medicines
Agency
breach

The European Medicines Agency (EMA) suffered a cyber attack. Regulatory data of the upcoming COVID-19 vaccines was unlawfully accessed. A few days later, an unknown entity leaked some stolen documents and emails online.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2020 - SolarWinds by APT29

SolarWinds
by APT29

A large-scale cyber espionage operation compromised tens of thousands of government agencies, prominent IT companies and high-profile entities worldwide. Attackers managed to breach the update mechanism of Orion, a highly popular network managing software by SolarWinds, and use it to infiltrate their victims via the software update chain.
CERT-EU - Threat Landscape Report - The 10 Years Edition - Quarter background CERT-EU - Threat Landscape Report - The 10 Years Edition - Go back

2021

CERT-EU - Threat Landscape Report - The 10 Years Edition - Year 2021 - route
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2021 - ProxyLogon

ProxyLogon

Multiple threat actors exploited several critical zero-day vulnerabilities in Microsoft Exchange. This was a global campaign with a serious impact. The exploitation started in November 2020 but only became publicly known in March 2021.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2021 - Pulse Secure VPN breached

Pulse Secure
VPN breached

Pulse Secure VPN appliances were compromised. There were numerous victims in the defence, government, finance, and other sectors. Cyber defence companies attribute the attack to Chinese threat actors.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2021 - APT29 upstream attacks

APT29 upstream attacks

The Russian APT29 threat actor targeted upstream cloud service resellers who are hosting or have access to the infrastructure of other organisations. This activity has been going on since at least May 2021, focussing on governments, think tanks, and companies in Europe and the US.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2021 - Colonial Pipeline ransomware

Colonial Pipeline
ransomware

Colonial Pipeline, the largest US fuel pipeline operator, halted its operations on May 7, after a Darkside ransomware attack on its IT systems.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2021 - Kaseya ransomware

Kaseya ransomware

A massive REvil ransomware attack affected multiple managed service providers (MSPs) and over a thousand of their customers. To compromise the MSPs, the attackers trojanised Kaseya Virtual Systems Administrator (VSA), a cloud-based MSP tool.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2021 - T-Mobile private data breach

T-Mobile
private
data
breach

Attackers broke into T-Mobile servers and stole files containing the personal information belonging to tens of millions of individuals. The massive breach impacted roughly 7.8 million T-Mobile postpaid customers, 850 000 T-Mobile prepaid users, and approximately 40 million former or prospective ones.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2021 - Ghostwriter campaign

Ghostwriter campaign

The Ghostwriter information and hacking operation was denounced by the EU who called it unacceptable and a threat to the EU’s basic values. The Ghostwriter campaign is variously attributed to Russia, Belarus, or both.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2021 - Log4Shell

Log4Shell

Log4Shell is a serious zero-day vulnerability affecting the Log4j utility. Log4j is a logging tool and can be found in a vast number of apps and software environments. The Log4Shell vulnerability had been exploited by a number of state-sponsored and criminal threat actors.
CERT-EU - Threat Landscape Report - The 10 Years Edition - 2021 - GoDaddy hosting compromise

GoDaddy hosting
compromise

GoDaddy, the world’s largest web host, was compromised. The breach impacted at least 1.2 million GoDaddy-managed WordPress customers. The incident also impacted GoDaddy’s partners and resellers, including European web hosts such as Host Europe and Heart Internet.

Important disclaimer

The information used to create this special '10 years' threat landscape report is based on public reports. The illustrations in this web page are inspired by those public reports. They do not necessarily reflect our stance. There have been many cyber events in the period 2011-2021. We tried to select those that made the headlines. This selection is by no means exhaustive.

Oops!

Sorry but you need a decent screen to view this page.

Trust us, you wouldn't want to miss all its glory and beauty by viewing it on the tiny screen of a phone or of a tablet in portrait mode (landscape works though)!

You wouldn't visit a museum if you needed a magnifying glass to view all the paintings, would you?

We got cookies

We only use cookies that are necessary for the technical functioning of our website. Find out more on here.