Knowledge (XXG)

Titan Rain

Source 📝

20: 138: 126:
research director, stated that the attacks came from individuals with "intense discipline" and that "no other organization could do this if they were not a military". Such sophistication has pointed toward the People's Liberation Army as the attackers.
149:) and China. The United Kingdom has stated officially that Chinese hackers attacked its governmental offices. Titan Rain has caused the rest of the world to be more cautious of attacks not just from China but from other countries as well. 134:. Although no classified information was reported stolen, the hackers were able to steal unclassified information (e.g., information from a home computer) that could reveal strengths and weaknesses of the United States. 1145: 207: 1140: 359: 110:). In 2006, an "organised Chinese hacking group" shut down a part of the UK House of Commons computer system. The Chinese government has denied responsibility. 550: 385: 480: 1090: 951: 438: 55: 294: 107: 319: 352: 217: 562: 490: 1105: 822: 661: 1115: 1130: 1095: 1135: 390: 380: 345: 454: 70: 1120: 103: 96: 1100: 577: 557: 47: 753: 827: 587: 894: 853: 602: 19: 1110: 1085: 920: 915: 506: 485: 1125: 910: 884: 625: 266: 158: 90: 234: 946: 459: 38:
since 2003; they were known to have been ongoing for at least three years. The attacks originated in
651: 270: 717: 422: 62: 743: 738: 775: 733: 635: 545: 475: 252: 213: 630: 511: 327: 173: 145:
Titan Rain has also caused distrust between other countries (such as the United Kingdom and
137: 74: 567: 65:
computer networks, which were targeted for their sensitive information, including those at
1034: 696: 676: 656: 646: 178: 66: 1060: 1003: 967: 763: 582: 168: 123: 99: 295:"The lesson of Titan Rain: Articulate the dangers of cyber attack to upper management" 1079: 1024: 806: 671: 597: 35: 998: 769: 686: 681: 532: 1008: 972: 869: 691: 620: 540: 119: 977: 592: 517: 163: 235:"The Invasion of the Chinese Cyberspies (And the Man Who Tried to Stop Them)" 1050: 1029: 206:
Bodmer, Sean; Kilger, Max; Carpenter, Gregory; Jones, Jade (July 24, 2012).
130:
Titan Rain reportedly attacked multiple organizations, such as NASA and the
118:
The U.S. government has blamed the Chinese government for the 2004 attacks.
39: 1055: 982: 941: 889: 801: 701: 572: 183: 31: 874: 786: 337: 925: 666: 612: 146: 46:. The activity is believed to be associated with a state-sponsored 879: 832: 253:"Connect the Dots on State-Sponsored Cyber Incidents - Titan Rain" 136: 43: 18: 837: 78: 341: 209:
Reverse Deception: Organized Cyber Threat Counter-Exploitation
131: 320:"The 7 worst cyberattacks in history (that we know about)" 16:
Series of coordinated attacks on American computer systems
95:
The attacks are reported to be the result of actions by
61:
Titan Rain hackers gained access to many United States
1146:
Chinese information operations and information warfare
271:"Titan Rain - how Chinese hackers targeted Whitehall" 201: 199: 141:
The U.S. Department of the Treasury, Washington, D.C.
1043: 1017: 991: 960: 934: 903: 862: 846: 815: 794: 785: 752: 726: 710: 611: 531: 499: 468: 447: 431: 409: 402: 102:. These hackers attacked both the US government ( 353: 8: 791: 406: 360: 346: 338: 1141:Chinese advanced persistent threat groups 439:Sony BMG copy protection rootkit scandal 212:. New York: McGraw-Hill Osborne Media. 195: 56:federal government of the United States 30:was a series of coordinated attacks on 23:Lockheed Martin Aeronautics Discussion 7: 326:. September 22, 2010. Archived from 14: 233:Thornburgh, Nathan (2005-08-29). 1091:Espionage scandals and incidents 50:. It was given the designation 1: 770:Kaminsky DNS cache poisoning 514:(findings published in 2010) 71:Sandia National Laboratories 299:Homeland Security News Wire 104:Defense Intelligence Agency 1162: 88: 48:advanced persistent threat 373: 106:) and the UK government ( 97:People's Liberation Army 1106:Information sensitivity 491:US military cyberattack 481:Cyberattacks on Georgia 455:Cyberattacks on Estonia 1116:21st-century conflicts 486:Sarah Palin email hack 267:Norton-Taylor, Richard 142: 24: 1131:Cyberwarfare by China 1096:Military intelligence 626:Jeanson James Ancheta 330:on November 12, 2014. 269:(September 5, 2007). 159:Cyberwarfare by China 140: 91:Cyberwarfare by China 89:Further information: 22: 1136:Hacking in the 2000s 460:Operation: Bot Roast 368:Hacking in the 2000s 301:. December 14, 2005 108:Ministry of Defence 1121:Electronic warfare 423:Operation Firewall 143: 63:defense contractor 25: 1101:National security 1073: 1072: 1069: 1068: 551:associated events 527: 526: 476:Project Chanology 397: 396: 1153: 792: 643:str0ke (milw0rm) 512:Operation Aurora 407: 376: 375: 362: 355: 348: 339: 332: 331: 316: 310: 309: 307: 306: 291: 285: 284: 282: 281: 263: 257: 256: 249: 243: 242: 230: 224: 223: 203: 174:Operation Aurora 75:Redstone Arsenal 1161: 1160: 1156: 1155: 1154: 1152: 1151: 1150: 1076: 1075: 1074: 1065: 1039: 1013: 987: 956: 930: 899: 858: 842: 823:Anna Kournikova 811: 781: 756: 754:Vulnerabilities 748: 722: 706: 697:Dmitry Sklyarov 677:Albert Gonzalez 607: 523: 495: 464: 443: 427: 398: 369: 366: 336: 335: 318: 317: 313: 304: 302: 293: 292: 288: 279: 277: 265: 264: 260: 251: 250: 246: 232: 231: 227: 220: 205: 204: 197: 192: 179:Shawn Carpenter 155: 116: 93: 87: 67:Lockheed Martin 34:systems in the 17: 12: 11: 5: 1159: 1157: 1149: 1148: 1143: 1138: 1133: 1128: 1123: 1118: 1113: 1108: 1103: 1098: 1093: 1088: 1078: 1077: 1071: 1070: 1067: 1066: 1064: 1063: 1058: 1053: 1047: 1045: 1041: 1040: 1038: 1037: 1032: 1027: 1021: 1019: 1015: 1014: 1012: 1011: 1009:Black Energy 1 1006: 1001: 995: 993: 989: 988: 986: 985: 980: 975: 970: 964: 962: 958: 957: 955: 954: 949: 944: 938: 936: 932: 931: 929: 928: 923: 918: 913: 907: 905: 901: 900: 898: 897: 892: 887: 882: 877: 872: 866: 864: 860: 859: 857: 856: 850: 848: 844: 843: 841: 840: 835: 830: 825: 819: 817: 813: 812: 810: 809: 804: 798: 796: 789: 783: 782: 780: 779: 773: 767: 764:Shatter attack 760: 758: 750: 749: 747: 746: 741: 736: 730: 728: 727:Hacking forums 724: 723: 721: 720: 714: 712: 708: 707: 705: 704: 699: 694: 689: 684: 679: 674: 669: 664: 659: 654: 649: 644: 641: 638: 633: 628: 623: 617: 615: 609: 608: 606: 605: 600: 595: 590: 585: 583:PLA Unit 61398 580: 575: 570: 565: 560: 555: 554: 553: 543: 537: 535: 529: 528: 525: 524: 522: 521: 515: 509: 507:Operation Troy 503: 501: 497: 496: 494: 493: 488: 483: 478: 472: 470: 466: 465: 463: 462: 457: 451: 449: 445: 444: 442: 441: 435: 433: 429: 428: 426: 425: 420: 413: 411: 404: 400: 399: 395: 394: 388: 383: 374: 371: 370: 367: 365: 364: 357: 350: 342: 334: 333: 311: 286: 258: 244: 225: 219:978-0071772495 218: 194: 193: 191: 188: 187: 186: 181: 176: 171: 169:Moonlight Maze 166: 161: 154: 151: 124:SANS Institute 115: 112: 86: 83: 15: 13: 10: 9: 6: 4: 3: 2: 1158: 1147: 1144: 1142: 1139: 1137: 1134: 1132: 1129: 1127: 1124: 1122: 1119: 1117: 1114: 1112: 1111:Data security 1109: 1107: 1104: 1102: 1099: 1097: 1094: 1092: 1089: 1087: 1086:Hacker groups 1084: 1083: 1081: 1062: 1059: 1057: 1054: 1052: 1049: 1048: 1046: 1042: 1036: 1033: 1031: 1028: 1026: 1023: 1022: 1020: 1016: 1010: 1007: 1005: 1002: 1000: 997: 996: 994: 990: 984: 981: 979: 976: 974: 971: 969: 966: 965: 963: 959: 953: 950: 948: 945: 943: 940: 939: 937: 933: 927: 924: 922: 919: 917: 914: 912: 909: 908: 906: 902: 896: 893: 891: 888: 886: 883: 881: 878: 876: 873: 871: 868: 867: 865: 861: 855: 852: 851: 849: 845: 839: 836: 834: 831: 829: 826: 824: 821: 820: 818: 814: 808: 805: 803: 800: 799: 797: 793: 790: 788: 784: 777: 774: 771: 768: 765: 762: 761: 759: 755: 751: 745: 742: 740: 737: 735: 732: 731: 729: 725: 719: 716: 715: 713: 709: 703: 700: 698: 695: 693: 690: 688: 685: 683: 680: 678: 675: 673: 670: 668: 665: 663: 660: 658: 655: 653: 650: 648: 645: 642: 639: 637: 634: 632: 629: 627: 624: 622: 619: 618: 616: 614: 610: 604: 601: 599: 598:World of Hell 596: 594: 591: 589: 586: 584: 581: 579: 576: 574: 571: 569: 566: 564: 561: 559: 556: 552: 549: 548: 547: 544: 542: 539: 538: 536: 534: 530: 519: 516: 513: 510: 508: 505: 504: 502: 498: 492: 489: 487: 484: 482: 479: 477: 474: 473: 471: 467: 461: 458: 456: 453: 452: 450: 446: 440: 437: 436: 434: 430: 424: 421: 418: 415: 414: 412: 408: 405: 401: 393: → 392: 389: 387: 384: 382: 379:←  378: 377: 372: 363: 358: 356: 351: 349: 344: 343: 340: 329: 325: 321: 315: 312: 300: 296: 290: 287: 276: 272: 268: 262: 259: 254: 248: 245: 240: 236: 229: 226: 221: 215: 211: 210: 202: 200: 196: 189: 185: 182: 180: 177: 175: 172: 170: 167: 165: 162: 160: 157: 156: 152: 150: 148: 139: 135: 133: 128: 125: 121: 113: 111: 109: 105: 101: 98: 92: 84: 82: 80: 76: 72: 68: 64: 59: 57: 53: 49: 45: 41: 37: 36:United States 33: 29: 21: 1126:Cyberattacks 952:Sony rootkit 718:Bluehell IRC 687:Dan Kaminsky 682:Sven Jaschan 416: 328:the original 323: 314: 303:. Retrieved 298: 289: 278:. Retrieved 275:The Guardian 274: 261: 247: 238: 228: 208: 144: 129: 117: 114:Consequences 94: 60: 51: 27: 26: 870:SQL Slammer 692:Samy Kamkar 613:Individuals 578:Level Seven 541:Ac1db1tch3z 520:(2008–2010) 419:(2003–2006) 120:Alan Paller 1080:Categories 757:discovered 744:darksun.ws 739:unkn0wn.eu 647:Lil Hacker 593:ShadowCrew 518:WebcamGate 417:Titan Rain 305:2018-05-10 280:2018-05-10 190:References 164:Red Apollo 100:Unit 61398 52:Titan Rain 28:Titan Rain 1051:Conficker 1030:Agent.btz 558:Avalanche 546:Anonymous 403:Incidents 85:Attackers 40:Guangdong 1056:Koobface 1035:Mariposa 983:Stration 978:Clickbot 942:PGPCoder 890:Graybird 828:Code Red 802:ILOVEYOU 776:sslstrip 734:ryan1918 711:Darknets 702:Stakkato 640:Digerati 636:Dshocker 603:Sandworm 573:GhostNet 386:Timeline 184:Stakkato 153:See also 32:computer 1061:Waledac 968:Rustock 895:Blaster 875:Welchia 807:Pikachu 787:Malware 657:camZero 54:by the 1025:Asprox 926:Mydoom 921:Sasser 916:NetSky 854:Simile 778:(2009) 772:(2008) 766:(2002) 672:diabl0 667:Cyxymu 662:Coolio 631:SilenZ 533:Groups 216:  147:Russia 77:, and 999:Storm 911:Bagle 885:Gruel 880:Sobig 833:Nimda 621:AKill 568:0x1fe 391:2010s 381:1990s 324:Dvice 44:China 1044:2009 1018:2008 1004:ZeuS 992:2007 973:ZLOB 961:2006 947:Samy 935:2005 904:2004 863:2003 847:2002 838:Klez 816:2001 795:2000 652:BadB 563:GNAA 500:2009 469:2008 448:2007 432:2005 410:2004 239:Time 214:ISBN 79:NASA 588:RBN 132:FBI 1082:: 322:. 297:. 273:. 237:. 198:^ 122:, 81:. 73:, 69:, 58:. 42:, 361:e 354:t 347:v 308:. 283:. 255:. 241:. 222:.

Index


computer
United States
Guangdong
China
advanced persistent threat
federal government of the United States
defense contractor
Lockheed Martin
Sandia National Laboratories
Redstone Arsenal
NASA
Cyberwarfare by China
People's Liberation Army
Unit 61398
Defense Intelligence Agency
Ministry of Defence
Alan Paller
SANS Institute
FBI

Russia
Cyberwarfare by China
Red Apollo
Moonlight Maze
Operation Aurora
Shawn Carpenter
Stakkato

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.