20:
138:
126:
research director, stated that the attacks came from individuals with "intense discipline" and that "no other organization could do this if they were not a military". Such sophistication has pointed toward the People's
Liberation Army as the attackers.
149:) and China. The United Kingdom has stated officially that Chinese hackers attacked its governmental offices. Titan Rain has caused the rest of the world to be more cautious of attacks not just from China but from other countries as well.
134:. Although no classified information was reported stolen, the hackers were able to steal unclassified information (e.g., information from a home computer) that could reveal strengths and weaknesses of the United States.
1145:
207:
1140:
359:
110:). In 2006, an "organised Chinese hacking group" shut down a part of the UK House of Commons computer system. The Chinese government has denied responsibility.
550:
385:
480:
1090:
951:
438:
55:
294:
107:
319:
352:
217:
562:
490:
1105:
822:
661:
1115:
1130:
1095:
1135:
390:
380:
345:
454:
70:
1120:
103:
96:
1100:
577:
557:
47:
753:
827:
587:
894:
853:
602:
19:
1110:
1085:
920:
915:
506:
485:
1125:
910:
884:
625:
266:
158:
90:
234:
946:
459:
38:
since 2003; they were known to have been ongoing for at least three years. The attacks originated in
651:
270:
717:
422:
62:
743:
738:
775:
733:
635:
545:
475:
252:
213:
630:
511:
327:
173:
145:
Titan Rain has also caused distrust between other countries (such as the United
Kingdom and
137:
74:
567:
65:
computer networks, which were targeted for their sensitive information, including those at
1034:
696:
676:
656:
646:
178:
66:
1060:
1003:
967:
763:
582:
168:
123:
99:
295:"The lesson of Titan Rain: Articulate the dangers of cyber attack to upper management"
1079:
1024:
806:
671:
597:
35:
998:
769:
686:
681:
532:
1008:
972:
869:
691:
620:
540:
119:
977:
592:
517:
163:
235:"The Invasion of the Chinese Cyberspies (And the Man Who Tried to Stop Them)"
1050:
1029:
206:
Bodmer, Sean; Kilger, Max; Carpenter, Gregory; Jones, Jade (July 24, 2012).
130:
Titan Rain reportedly attacked multiple organizations, such as NASA and the
118:
The U.S. government has blamed the
Chinese government for the 2004 attacks.
39:
1055:
982:
941:
889:
801:
701:
572:
183:
31:
874:
786:
337:
925:
666:
612:
146:
46:. The activity is believed to be associated with a state-sponsored
879:
832:
253:"Connect the Dots on State-Sponsored Cyber Incidents - Titan Rain"
136:
43:
18:
837:
78:
341:
209:
Reverse
Deception: Organized Cyber Threat Counter-Exploitation
131:
320:"The 7 worst cyberattacks in history (that we know about)"
16:
Series of coordinated attacks on
American computer systems
95:
The attacks are reported to be the result of actions by
61:
Titan Rain hackers gained access to many United States
1146:
Chinese information operations and information warfare
271:"Titan Rain - how Chinese hackers targeted Whitehall"
201:
199:
141:
The U.S. Department of the
Treasury, Washington, D.C.
1043:
1017:
991:
960:
934:
903:
862:
846:
815:
794:
785:
752:
726:
710:
611:
531:
499:
468:
447:
431:
409:
402:
102:. These hackers attacked both the US government (
353:
8:
791:
406:
360:
346:
338:
1141:Chinese advanced persistent threat groups
439:Sony BMG copy protection rootkit scandal
212:. New York: McGraw-Hill Osborne Media.
195:
56:federal government of the United States
30:was a series of coordinated attacks on
23:Lockheed Martin Aeronautics Discussion
7:
326:. September 22, 2010. Archived from
14:
233:Thornburgh, Nathan (2005-08-29).
1091:Espionage scandals and incidents
50:. It was given the designation
1:
770:Kaminsky DNS cache poisoning
514:(findings published in 2010)
71:Sandia National Laboratories
299:Homeland Security News Wire
104:Defense Intelligence Agency
1162:
88:
48:advanced persistent threat
373:
106:) and the UK government (
97:People's Liberation Army
1106:Information sensitivity
491:US military cyberattack
481:Cyberattacks on Georgia
455:Cyberattacks on Estonia
1116:21st-century conflicts
486:Sarah Palin email hack
267:Norton-Taylor, Richard
142:
24:
1131:Cyberwarfare by China
1096:Military intelligence
626:Jeanson James Ancheta
330:on November 12, 2014.
269:(September 5, 2007).
159:Cyberwarfare by China
140:
91:Cyberwarfare by China
89:Further information:
22:
1136:Hacking in the 2000s
460:Operation: Bot Roast
368:Hacking in the 2000s
301:. December 14, 2005
108:Ministry of Defence
1121:Electronic warfare
423:Operation Firewall
143:
63:defense contractor
25:
1101:National security
1073:
1072:
1069:
1068:
551:associated events
527:
526:
476:Project Chanology
397:
396:
1153:
792:
643:str0ke (milw0rm)
512:Operation Aurora
407:
376:
375:
362:
355:
348:
339:
332:
331:
316:
310:
309:
307:
306:
291:
285:
284:
282:
281:
263:
257:
256:
249:
243:
242:
230:
224:
223:
203:
174:Operation Aurora
75:Redstone Arsenal
1161:
1160:
1156:
1155:
1154:
1152:
1151:
1150:
1076:
1075:
1074:
1065:
1039:
1013:
987:
956:
930:
899:
858:
842:
823:Anna Kournikova
811:
781:
756:
754:Vulnerabilities
748:
722:
706:
697:Dmitry Sklyarov
677:Albert Gonzalez
607:
523:
495:
464:
443:
427:
398:
369:
366:
336:
335:
318:
317:
313:
304:
302:
293:
292:
288:
279:
277:
265:
264:
260:
251:
250:
246:
232:
231:
227:
220:
205:
204:
197:
192:
179:Shawn Carpenter
155:
116:
93:
87:
67:Lockheed Martin
34:systems in the
17:
12:
11:
5:
1159:
1157:
1149:
1148:
1143:
1138:
1133:
1128:
1123:
1118:
1113:
1108:
1103:
1098:
1093:
1088:
1078:
1077:
1071:
1070:
1067:
1066:
1064:
1063:
1058:
1053:
1047:
1045:
1041:
1040:
1038:
1037:
1032:
1027:
1021:
1019:
1015:
1014:
1012:
1011:
1009:Black Energy 1
1006:
1001:
995:
993:
989:
988:
986:
985:
980:
975:
970:
964:
962:
958:
957:
955:
954:
949:
944:
938:
936:
932:
931:
929:
928:
923:
918:
913:
907:
905:
901:
900:
898:
897:
892:
887:
882:
877:
872:
866:
864:
860:
859:
857:
856:
850:
848:
844:
843:
841:
840:
835:
830:
825:
819:
817:
813:
812:
810:
809:
804:
798:
796:
789:
783:
782:
780:
779:
773:
767:
764:Shatter attack
760:
758:
750:
749:
747:
746:
741:
736:
730:
728:
727:Hacking forums
724:
723:
721:
720:
714:
712:
708:
707:
705:
704:
699:
694:
689:
684:
679:
674:
669:
664:
659:
654:
649:
644:
641:
638:
633:
628:
623:
617:
615:
609:
608:
606:
605:
600:
595:
590:
585:
583:PLA Unit 61398
580:
575:
570:
565:
560:
555:
554:
553:
543:
537:
535:
529:
528:
525:
524:
522:
521:
515:
509:
507:Operation Troy
503:
501:
497:
496:
494:
493:
488:
483:
478:
472:
470:
466:
465:
463:
462:
457:
451:
449:
445:
444:
442:
441:
435:
433:
429:
428:
426:
425:
420:
413:
411:
404:
400:
399:
395:
394:
388:
383:
374:
371:
370:
367:
365:
364:
357:
350:
342:
334:
333:
311:
286:
258:
244:
225:
219:978-0071772495
218:
194:
193:
191:
188:
187:
186:
181:
176:
171:
169:Moonlight Maze
166:
161:
154:
151:
124:SANS Institute
115:
112:
86:
83:
15:
13:
10:
9:
6:
4:
3:
2:
1158:
1147:
1144:
1142:
1139:
1137:
1134:
1132:
1129:
1127:
1124:
1122:
1119:
1117:
1114:
1112:
1111:Data security
1109:
1107:
1104:
1102:
1099:
1097:
1094:
1092:
1089:
1087:
1086:Hacker groups
1084:
1083:
1081:
1062:
1059:
1057:
1054:
1052:
1049:
1048:
1046:
1042:
1036:
1033:
1031:
1028:
1026:
1023:
1022:
1020:
1016:
1010:
1007:
1005:
1002:
1000:
997:
996:
994:
990:
984:
981:
979:
976:
974:
971:
969:
966:
965:
963:
959:
953:
950:
948:
945:
943:
940:
939:
937:
933:
927:
924:
922:
919:
917:
914:
912:
909:
908:
906:
902:
896:
893:
891:
888:
886:
883:
881:
878:
876:
873:
871:
868:
867:
865:
861:
855:
852:
851:
849:
845:
839:
836:
834:
831:
829:
826:
824:
821:
820:
818:
814:
808:
805:
803:
800:
799:
797:
793:
790:
788:
784:
777:
774:
771:
768:
765:
762:
761:
759:
755:
751:
745:
742:
740:
737:
735:
732:
731:
729:
725:
719:
716:
715:
713:
709:
703:
700:
698:
695:
693:
690:
688:
685:
683:
680:
678:
675:
673:
670:
668:
665:
663:
660:
658:
655:
653:
650:
648:
645:
642:
639:
637:
634:
632:
629:
627:
624:
622:
619:
618:
616:
614:
610:
604:
601:
599:
598:World of Hell
596:
594:
591:
589:
586:
584:
581:
579:
576:
574:
571:
569:
566:
564:
561:
559:
556:
552:
549:
548:
547:
544:
542:
539:
538:
536:
534:
530:
519:
516:
513:
510:
508:
505:
504:
502:
498:
492:
489:
487:
484:
482:
479:
477:
474:
473:
471:
467:
461:
458:
456:
453:
452:
450:
446:
440:
437:
436:
434:
430:
424:
421:
418:
415:
414:
412:
408:
405:
401:
393: →
392:
389:
387:
384:
382:
379:←
378:
377:
372:
363:
358:
356:
351:
349:
344:
343:
340:
329:
325:
321:
315:
312:
300:
296:
290:
287:
276:
272:
268:
262:
259:
254:
248:
245:
240:
236:
229:
226:
221:
215:
211:
210:
202:
200:
196:
189:
185:
182:
180:
177:
175:
172:
170:
167:
165:
162:
160:
157:
156:
152:
150:
148:
139:
135:
133:
128:
125:
121:
113:
111:
109:
105:
101:
98:
92:
84:
82:
80:
76:
72:
68:
64:
59:
57:
53:
49:
45:
41:
37:
36:United States
33:
29:
21:
1126:Cyberattacks
952:Sony rootkit
718:Bluehell IRC
687:Dan Kaminsky
682:Sven Jaschan
416:
328:the original
323:
314:
303:. Retrieved
298:
289:
278:. Retrieved
275:The Guardian
274:
261:
247:
238:
228:
208:
144:
129:
117:
114:Consequences
94:
60:
51:
27:
26:
870:SQL Slammer
692:Samy Kamkar
613:Individuals
578:Level Seven
541:Ac1db1tch3z
520:(2008–2010)
419:(2003–2006)
120:Alan Paller
1080:Categories
757:discovered
744:darksun.ws
739:unkn0wn.eu
647:Lil Hacker
593:ShadowCrew
518:WebcamGate
417:Titan Rain
305:2018-05-10
280:2018-05-10
190:References
164:Red Apollo
100:Unit 61398
52:Titan Rain
28:Titan Rain
1051:Conficker
1030:Agent.btz
558:Avalanche
546:Anonymous
403:Incidents
85:Attackers
40:Guangdong
1056:Koobface
1035:Mariposa
983:Stration
978:Clickbot
942:PGPCoder
890:Graybird
828:Code Red
802:ILOVEYOU
776:sslstrip
734:ryan1918
711:Darknets
702:Stakkato
640:Digerati
636:Dshocker
603:Sandworm
573:GhostNet
386:Timeline
184:Stakkato
153:See also
32:computer
1061:Waledac
968:Rustock
895:Blaster
875:Welchia
807:Pikachu
787:Malware
657:camZero
54:by the
1025:Asprox
926:Mydoom
921:Sasser
916:NetSky
854:Simile
778:(2009)
772:(2008)
766:(2002)
672:diabl0
667:Cyxymu
662:Coolio
631:SilenZ
533:Groups
216:
147:Russia
77:, and
999:Storm
911:Bagle
885:Gruel
880:Sobig
833:Nimda
621:AKill
568:0x1fe
391:2010s
381:1990s
324:Dvice
44:China
1044:2009
1018:2008
1004:ZeuS
992:2007
973:ZLOB
961:2006
947:Samy
935:2005
904:2004
863:2003
847:2002
838:Klez
816:2001
795:2000
652:BadB
563:GNAA
500:2009
469:2008
448:2007
432:2005
410:2004
239:Time
214:ISBN
79:NASA
588:RBN
132:FBI
1082::
322:.
297:.
273:.
237:.
198:^
122:,
81:.
73:,
69:,
58:.
42:,
361:e
354:t
347:v
308:.
283:.
255:.
241:.
222:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.