• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cisco Umbrella

Enterprise network security

  • Contact Sales
  • Login
    • Umbrella Login
    • Cloudlock Login
  • Why Us
    • Why Cisco Umbrella
      • Why Try Umbrella
      • Why DNS Security
      • Why Umbrella SASE
      • Our Customers
      • Customer Stories
      • Why Cisco Secure
    • Fast Reliable Cloud
      • Global Cloud Architecture
      • Cloud Network Status
      • Global Cloud Network Activity
    • Unmatched Intelligence
      • A New Approach to Cybersecurity
      • Interactive Intelligence
      • Cyber Attack Prevention
      • Umbrella and Cisco Talos Threat Intelligence
    • Extensive Integrations
      • IT Security Integrations
      • Hardware Integrations
      • Meraki Integration
      • Cisco Umbrella and SecureX
  • Products
    • Cisco Umbrella Products
      • Cisco Umbrella Cloud Security Service
      • Recursive DNS Services
      • Cisco Umbrella SIG
      • Umbrella Investigate
      • What’s New
    • Product Packages
      • Cisco Umbrella Package Comparison
      • – DNS Security Essentials Package
      • – DNS Security Advantage Package
      • – SIG Essentials Package
      • – SIG Advantage Package
      • Umbrella Support Packages
    • Functionality
      • DNS-Layer Security
      • Secure Web Gateway
      • Cloud Access Security Broker (CASB)
      • Cloud Data Loss Prevention (DLP)
      • Cloud-Delivered Firewall
      • Cloud Malware Protection
      • Remote Browser Isolation (RBI)
    • Man on a laptop with headphones on. He is attending a Cisco Umbrella Live Demo
  • Solutions
    • SASE & SSE Solutions
      • Cisco Umbrella SASE
      • Secure Access Service Edge (SASE)
      • What is SASE
      • What is Security Service Edge (SSE)
    • Functionality Solutions
      • Web Content Filtering
      • Secure Direct Internet Access
      • Shadow IT Discovery & App Blocking
      • Fast Incident Response
      • Unified Threat Management
      • Protect Mobile Users
      • Securing Remote and Roaming Users
    • Network Solutions
      • Guest Wi-Fi Security
      • SD-WAN Security
      • Off-Network Endpoint Security
    • Industry Solutions
      • Government and Public Sector Cybersecurity
      • Financial Services Security
      • Cybersecurity for Manufacturing
      • Higher Education Security
      • K-12 Schools Security
      • Healthcare, Retail and Hospitality Security
      • Enterprise Cloud Security
      • Small Business Cybersecurity
  • Resources
    • Content Library
      • Top Resources
      • Cybersecurity Webinars
      • Events
      • Research Reports
      • Case Studies
      • Videos
      • Datasheets
      • eBooks
      • Solution Briefs
    • International Documents
      • Deutsch/German
      • Español/Spanish
      • Français/French
      • Italiano/Italian
      • 日本語/Japanese
    • For Customers
      • Support
      • Customer Success Webinars
      • Cisco Umbrella Studio
    • Get the 2022 Cloud Scurity Comparison Guide
  • Trends & Threats
    • Market Trends
      • Hybrid Workforce
      • Rise of Remote Workers
      • Secure Internet Gateway (SIG)
    • Security Threats
      • How to Stop Phishing Attacks
      • Malware Detection and Protection
      • Ransomware is on the Rise
      • Cryptomining Malware Protection
      • Cybersecurity Threat Landscape
      • Global Cyber Threat Intelligence
      • Cyber Threat Categories and Definitions
    •  
    • Woman connecting confidently to any device anywhere
  • Partners
    • Channel Partners
      • Partner Program
      • Become a Partner
    • Service Providers
      • Secure Connectivity
      • Managed Security for MSSPs
      • Managed IT for MSPs
    •  
    • Person looking down at laptop. They are connecting and working securely
  • Blog
    • News & Product Posts
      • Latest Posts
      • Products & Services
      • Customer Focus
      • Feature Spotlight
    • Cybersecurity Posts
      • Security
      • Threats
      • Cybersecurity Threat Spotlight
      • Research
    •  
    • Register for a webinar - with illustration of connecting securely to the cloud
  • Contact Us
  • Umbrella Login
  • Cloudlock Login
  • Free Trial
Security

2015: The Year Hacking Got Personal

By Owen Lystrup
Posted on December 10, 2015
Updated on March 28, 2022

Share

FacebookTweetLinkedIn

This Attack Feels Different
Following the Ashley Madison hack in July 2015, Troy Hunt — the security expert who runs HaveIBeenPwned.com — started receiving inquiries and pleas from people worrying about whether or not their names and e-mails would be found in the database hackers published online.

For some, the hack sparked deep seeded feelings of guilt and remorse. Some registered users even admitted considering the worst. “I have contemplated suicide daily for the past week,” one person e-mailed to Hunt. “My two beautiful children and my wife are keeping me alive. I am very worried that her family and others will find out, making it extremely difficult for her to stay with me.”

Example of Ransomware attack message

The motivations behind this attack seemed different than just a commonplace data grab. It was more personal, intending at first to do serious damage to Ashley Madison and its reputation. But because of the site’s purpose, the hack had a devastating effect on affected users. Names, e-mail addresses, credit card information, purchase history, search queries, and profile information were all published online for anyone in the world to search. People could easily find friends, colleagues, family members, spouses, or even enemies and conclude they were cheaters, even if that was not the case. Suddenly careers, relationships, and families were jeopardized as a result of trusting a site that promised privacy — something we all do every day.

2014: The Year of the Breach as Usual
While Target was still going through settlement proceedings in the aftermath of its huge data breach in 2013, hackers hit Sony Pictures, Home Depot, JP Morgan Chase, Spotify, Neiman-Marcus, CHS Community Health Systems, Staples, Michael’s, and eBay (not to mention dozens of others), causing the media and the security community to label 2014 the year of the breach.

It was the year every corporation in the world woke up to the dire state of security. But the motive for these attacks — with the exception of Sony — made logical sense, as the economic rewards were direct and immediate. Grab as much data as possible; then sell it to the highest bidder. The hackers involved were mostly out to make a buck, not ruin lives.

Sony pictures was hit by ransomware attack

And while individual users, consumers, and shoppers might have gone through the annoyance of needing a new credit card or a password reset, the effects of losing personal data in a massive breach never hurts in the same exigent sense of what happened throughout 2015.
The hacks witnessed this year — though the large data grabbing hacks also continued — hit an intimate level.

2015: The Year of Extortion
Though Ashley Madison provided a yet unseen case study in what can happen when the incriminating details of millions of individuals’ lives get published online, monetary gains were still very much a motivation for hackers in 2015. Shortly after the attack, extortionists began to send threats of notifying the spouses and friends of individuals found in the leaked database, unless they received a Bitcoin payment.

Ransomware also amplified to an astounding level. McAfee estimated the number of attacks in the third quarter of 2013 at 1.5 million. In the second quarter of 2015, that estimate was 4 million, with 1.2 million of the attacks being totally new. The rapid popularity growth is likely due to the cheap and effective nature of ransomware attacks. Hackers now only need to spend a marginal amount of capital to set up an infrastructure, and the returns can be large.

Ransomware attacks strike fairly indiscriminately, hitting both companies networks and individuals alike. Once in, the exploits are written to deliberately encrypt files that are likely irreplaceable.

Victims through no fault of their own suddenly risk losing videos and photos of their first born, or the last trip to see Grandma, or the important tax files needed for next year’s return. Some of the latest variants of attack even add insult to injury, mocking victims with a taunting pop-up message once files are encrypted.

Unfortunately, these attacks work often enough to encourage attackers to persist. Hitting individuals and corporate networks alike, ransomware has become so effective that an FBI agent speaking at a security conference this year admitted to suggesting that victims just pay the ransom to avoid losing access to files forever.
There are precautions (like backing up files to the cloud) that can help protect against losing data, and security companies are pitching in to provide tools that can help decrypt locked files. This is great news for infected computers, but security and cryptology experts are already imagining a future in which people are faced with the dilemma of paying a ransom to get your car to start in the morning or watch Netflix on a smart TV.

That imagined future might already be on the doorstep.

IoT: Insecurity at Work, at Home, and on the Road
In June researchers OpenDNS Security Labs published a report examining the security of various Internet of Things (IoT) devices, after finding that all of the devices examined had a vulnerability of one kind or another. It’s becoming clear that security is often an afterthought for IoT device manufacturers and software developers.

Dolls could be enabled to spy on children

Also in 2015, researchers Chris Valasek and Charlie Miller demonstrated the very real possibility of disabling a car while its being driven; a Barbie doll showed it could be used to spy on children; vulnerabilities in apps from VTech breached millions of images and voice messages of children (luckily they were not published); researchers at Rapid7 demonstrated that nine publicly available baby monitors were vulnerable to attack; and security expert Billy Rios was hired by the Mayo Clinic to hack medical equipment currently deployed in hospitals to find out which devices vulnerable — all of them were hackable.

It seems the forewarnings of the risks embedded devices bring to the workplace, and into our homes and lives, are already too late. IoT is hackable, and they are already present in everyday life.

How We Turn the Tide
If attacks are getting more personal, we must all start taking security personally. Though it was a challenging year in a lot of ways, 2015 is also seeing a lot of positive progress in security.
Researchers advanced their detection methods and threat intelligence models. Industry experts are starting to collaborate more, as are government entities from different nations. The US government has decided to start taking security seriously. Encryption now owns a front-and-center role in the dialog about the future of security. Security companies are using secure web gateways and are having success finding and mitigating large scale attacks that affect millions. And two-factor authentication is becoming a standard for vendors.

Apology posted to Pastebin.
Captured from Pastebin.

Even a ransomware author has shown a change of heart, posting an apology and decryption details to Pastebin.

But there is still much work to do. All the efforts of the smartest security experts in the world, and the billions of dollars invested in safety for online users and their devices cannot save an ignorant Internet populace. We are reaching a critical point for individual Internet users to accept some responsibility for their own security and apply common sense with their decisions about trust, password management, financial transactions, and what to post online.
There is no question; the hacks that occurred this year were alarming. But as the Internet will only increase its role in our daily lives, it’s imperative to keep up the fight in 2016 and beyond.

Previous Post:

Previous Article

Next Post:

Next Article

Follow Us

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube

Footer Sections

What we make

  • Cloud Security Service
  • DNS-Layer Network Security
  • Secure Web Gateway
  • Security Packages

Who we are

  • Global Cloud Architecture
  • Cloud Network Status
  • Cloud Network Activity
  • OpenDNS is now Umbrella
  • Cisco Umbrella Blog

Learn more

  • Webinars
  • Careers
  • Support
  • Cisco Umbrella Live Demo
  • Contact Sales
Umbrella by Cisco
208.67.222.222+208.67.220.220
2620:119:35::35+2620:119:53::53
Sign up for a Free Trial
  • Cisco Online Privacy Statement
  • Terms of Service
  • Sitemap

© 2023 Cisco Umbrella