{"id":17261,"date":"2019-12-19T11:10:02","date_gmt":"2019-12-19T19:10:02","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/12\/19\/news-10997\/"},"modified":"2019-12-19T11:10:02","modified_gmt":"2019-12-19T19:10:02","slug":"news-10997","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/12\/19\/news-10997\/","title":{"rendered":"A decade in cybersecurity fails: the top breaches, threats, and \u2018whoopsies\u2019 of the 2010s"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 19 Dec 2019 18:03:33 +0000<\/strong><\/p>\n<p><em>This post was co-authored by Wendy Zamora and Chris Boyd. All opinions expressed belong to your mom.<\/em><\/p>\n<p>Back in the days before climate change stretched frigid winter months directly into the insta-sweat of summer, there was a saying about March: in like a lamb, out like a lion. The same might be said about the last decade in cybersecurity fails.<\/p>\n<p>What kicked off with a handful of stories about niche hacks ballooned into daily splashy headlines about massive data breaches, dangerous outbreaks, and increasingly sophisticated attack campaigns. The game has truly changed, generating a multi-billion-dollar industrial complex, and inspiring millions to stock up on tinfoil hats while saving trendy rumpus room designs to their Pinterest boards. <\/p>\n<p>To comment on the sweeping changes brought on by the last 10 years of hacks, breaches, privacy debates, and evolutions in malware, Malwarebytes researchers Wendy Zamora and Chris Boyd take a look at the most noteworthy, mind-blowing, and sometimes chuckle-inducing cybersecurity fails that defined the decade.<\/p>\n<h3>2011: Game over, PlayStation<\/h3>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41614\" data-permalink=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/attachment\/shutterstock_1494030932\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1494030932.jpg\" data-orig-size=\"1000,667\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"shutterstock_1494030932\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1494030932-300x200.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1494030932-600x400.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1494030932-600x400.jpg\" alt=\"cybersecurity fails playstation\" class=\"wp-image-41614\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1494030932-600x400.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1494030932-300x200.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1494030932.jpg 1000w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p><strong>WZ:<\/strong> It all started with the gamers. In my mind, gaming is nearly as genre-defining as porn when it comes to testing, adopting, and embracing early tech evolutions. The two go hand-in-hand, so to speak.<\/p>\n<p>I\u2019ll just give you a minute to wipe that last image out of your head before proceeding.<\/p>\n<p>Great. So, in 2011 the world got its first glimpse at the power of a good hack to not only steal data, but also bring operations to a grinding halt. The <a href=\"https:\/\/www.theguardian.com\/technology\/2011\/apr\/26\/playstation-network-hackers-data\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">77 million members of the Sony PlayStation Network<\/a>, including minors under the age of 18, had their personal data exposed to hackers. But worse for the gamers, they were locked out of their accounts for 23 days, unable to play online, purchase, or otherwise indulge in their favorite pastime. <\/p>\n<p>For the sheer number of users alone, this hack is noteworthy, but more, it was a foreshadowing of the ways in which cybersecurity fails could do more than just steal information\u2014they could disrupt lives.<\/p>\n<h3>2012: Mat Honan\u2019s digital life torched<\/h3>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41615\" data-permalink=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/attachment\/shutterstock_753581842\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_753581842.jpg\" data-orig-size=\"1000,667\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"shutterstock_753581842\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_753581842-300x200.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_753581842-600x400.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_753581842-600x400.jpg\" alt=\"cybersecurity fails mat honan\" class=\"wp-image-41615\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_753581842-600x400.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_753581842-300x200.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_753581842.jpg 1000w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p><strong>CB: <\/strong>PlayStation was significant for sheer cultural impact, if not actual affected numbers, given the size of recent breaches. I usually groan when looking at yearly lists of cybersecurity fails because I know 90 percent of it is going to be the same generic breach we\u2019ve all seen a hundred times over. Yes, it\u2019s bad that six million customer records were swiped from a web-facing database. No, it doesn\u2019t make for interesting reading. <\/p>\n<p>Instead, I\u2019m much more interested in specific examples of personal ruination. One such example is from 2012, when technology writer Mat Honan <a href=\"https:\/\/www.wired.com\/2012\/08\/apple-amazon-mat-honan-hacking\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">found his entire digital world torn in half<\/a>. I\u2019d argue this is one of the most spectacular digital demolition jobs I\u2019ve ever seen. The crooks had no interest in him, his data, or his devices. They just wanted that sweet, sweet three-character Twitter handle. If everything important to him was torched along the way? Too bad, so sad. <\/p>\n<p>This guy pretty much lost everything of real, singular importance to him in the attack. All those photos of his kid as a baby? Bam, gone. Google account taken over and deleted. iPhone and iPad data erased. Anything still on his MacBook drive was locked away behind features designed to make his life more secure, like the four-digit PIN. The worst feeling in the world isn\u2019t just the compromise; it\u2019s knowing that those helpful systems are a gigantic pain in the backside once someone who isn\u2019t you is in the driving seat.<\/p>\n<p>Some basic actions\u2014enabling 2FA on gmail and making backups\u2014would have essentially made this a non-event. Did Honan miraculously manage to get his photographs back? Sure. It was a lucky escape, and we generally don\u2019t get that lucky. This was one of those landmark, hot knife through buttery cybersecurity fails. I double dare you to top it.<\/p>\n<h3>2013: Snowed under<\/h3>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41616\" data-permalink=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/attachment\/shutterstock_153211979\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_153211979.jpg\" data-orig-size=\"1000,667\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"shutterstock_153211979\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_153211979-300x200.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_153211979-600x400.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_153211979-600x400.jpg\" alt=\"cybersecurity fails snowden\" class=\"wp-image-41616\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_153211979-600x400.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_153211979-300x200.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_153211979.jpg 1000w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p><strong>WZ: <\/strong>Sure, sure, Honan\u2019s digital demise uncovered many holes in security processes we previously thought were failsafe, and maybe taught Apple customer service a valuable lesson in active listening. But as you yourself noted\u2014I don\u2019t think anyone learned anything from it. In contrast, <a href=\"https:\/\/www.businessinsider.com\/snowden-leaks-timeline-2016-9\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Edward Snowden<\/a> jolted the world out of its collective ostrich pose and demonstrated how very much 1984 got it right. <\/p>\n<p>Depending on which side of democracy you stand on, Snowden, a former CIA contractor-turned-whistleblower, is either a hero or a war criminal for his 2013 revelations about the extent and reach of NSA-sponsored surveillance systems set up in the aftermath of 9\/11. Global telecommunications systems, Internet watch lists, international cooperation, the works. In the list of cybersecurity fails, this may be the Holy Grail.<\/p>\n<p>Regardless of political stance, Snowden\u2019s reveal was a real eye-opener for the public, and it sparked a massive worldwide debate that rages on to this day. They call it <a href=\"https:\/\/www.huffpost.com\/entry\/the-snowden-effect_b_58c35900e4b0a797c1d39cdc\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">\u201cthe Snowden effect.\u201d<\/a><\/p>\n<p>Just ask anyone what\u2019s more important to them: national security or personal privacy? Do they have \u201cnothing to hide\u201d or is their right to stay off the grid of upmost importance? If you can easily answer this question and guarantee everyone in the room with you agrees, then you must be reading this from far in the future, when this list will look positively quaint in comparison to yours.<\/p>\n<h3>2013: Cryptolocker ransomware changes the game<\/h3>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41617\" data-permalink=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/attachment\/shutterstock_641268832\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_641268832.jpg\" data-orig-size=\"5000,3767\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"shutterstock_641268832\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_641268832-300x226.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_641268832-600x452.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_641268832-600x452.jpg\" alt=\"cybersecurity fails cryptolocker\" class=\"wp-image-41617\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_641268832-600x452.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_641268832-300x226.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p><strong>CB: <\/strong>Okay, Snowden is a double-edged sword. On the one hand, he helped confirm that those conspiracy theorists were onto something. On the other hand, he helped confirm that those conspiracy theorists were onto something. I also wonder if the significance of his findings made that much of an impact outside the US, considering lots of folks just shrugged and carried on regardless.<\/p>\n<p>If you want actual global impact on a scale you can feel, ransomware is where it\u2019s at. Cryptolocker ransomware, specifically. <\/p>\n<p>Ransomware was all fun and games until <a href=\"https:\/\/blog.malwarebytes.com\/101\/2013\/10\/cryptolocker-ransomware-what-you-need-to-know\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Cryptolocker (opens in a new tab)\">Cryptolocker<\/a> came onto the scene and dashed users\u2019 hopes by being the first widespread malware to encrypt files and hold them hostage until ransom was paid. Ransomware prior to Cryptolocker mostly relied on cheap tricks instead of encryption, but its arrival in 2013 cemented this method\u2019s popularity forever, spawning clones and higher encryption stakes by the bucketload. <\/p>\n<h3>2013 again: Target hack<\/h3>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41618\" data-permalink=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/attachment\/shutterstock_201061232\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_201061232.jpg\" data-orig-size=\"1000,750\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"shutterstock_201061232\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_201061232-300x225.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_201061232-600x450.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_201061232-600x450.jpg\" alt=\"cybersecurity fails target\" class=\"wp-image-41618\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_201061232-600x450.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_201061232-300x225.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_201061232.jpg 1000w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p><strong>WZ: <\/strong>Okay, I will totally give you Cryptolocker. Game changer, no question. But this next breach is the quintessential lesson in \u201cit only takes one time,\u201d the Occam\u2019s razor of cybersecurity fails. It also happened to be the splashiest, loudest security news of the decade (so far). Why? Because everyone loves Target. Everyone.<\/p>\n<p>In 2013, <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/krebsonsecurity.com\/2015\/09\/inside-target-corp-days-after-2013-breach\/\" target=\"_blank\">Target screwed up big time.<\/a> Its HVAC vendor had been hit with malware via lowly <a href=\"https:\/\/krebsonsecurity.com\/2014\/02\/email-attack-on-vendor-set-up-breach-at-target\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">phishing email<\/a>, but the technician remained dubiously unaware of that infection, which went ahead and stole Target\u2019s network credentials. Hey, kids! What happens when you give third parties access to your VPN without thoroughly vetting them or their equipment for threats? You get hacked. <\/p>\n<p>Also, note to businesses of all sizes: Free scanners do not proactively block threats. (Yes, we know, the HVAC people were using the free version of Malwarebytes.) They detect and clean malware <em>only when you run a scan<\/em>. Had the vendor been using our real-time anti-malware technology (or any other antivirus platform with always-on protection), this attack would have been erased from history. <\/p>\n<h3>2014: sorry, celebs! The Sony Pictures hack<\/h3>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41636\" data-permalink=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/attachment\/shutterstock_318256490\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_318256490.jpg\" data-orig-size=\"1000,1000\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"shutterstock_318256490\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_318256490-300x300.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_318256490-600x600.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_318256490-600x600.jpg\" alt=\"sony\" class=\"wp-image-41636\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_318256490-600x600.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_318256490-150x150.jpg 150w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_318256490-300x300.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_318256490.jpg 1000w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p><strong>CB: <\/strong>Everyone may love Target in the US, but on the other side of the pond, we enjoy \u00a31 stores where everything costs, uh, \u00a31.50. No, I don\u2019t understand it either. What I do understand is I\u2019m about to up the stakes to DEFCON 1 (Is that the bad one?) with a hacking tale that truly went viral. Step forward for the second time today, Sony! <\/p>\n<p>The long version of the Sony Pictures hack can be <a href=\"https:\/\/www.vox.com\/2015\/1\/20\/18089084\/sony-hack-north-korea\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">read here<\/a>. The short version? A hacker group called Guardians of Peace pilfered massive amounts of data from Sony servers, and in the years that have followed, it\u2019s now tricky to remember where conspiracy theories and documented facts cross paths. A shady North Korean conspiracy, FBI and NSA involvement, multiple unreleased movies dumped online, thinly-veiled references to terrorist acts unless <em>The Interview <\/em>was pulled from theatres, and more all happened in the space of a month.<\/p>\n<p>This cybersecurity fail is the equivalent of a <em>Fast and Furious<\/em> movie where the smalltime family of car heisters somehow ends up stealing nuclear footballs and taking down Russian submarines in their spare time. Also, hurling insults at someone who starred in a film called <em>Hackers<\/em> seems like a great way to invoke the Gods of dramatic irony.<\/p>\n<h3>2015: not sorry, cheaters<\/h3>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41637\" data-permalink=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/attachment\/shutterstock_598152260\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_598152260.jpg\" data-orig-size=\"1000,667\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"shutterstock_598152260\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_598152260-300x200.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_598152260-600x400.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_598152260-600x400.jpg\" alt=\"cybersecurity fails ashley madison\" class=\"wp-image-41637\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_598152260-600x400.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_598152260-300x200.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_598152260.jpg 1000w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p><strong>WZ: <\/strong>Yikes, yeah, 2014 was not a great year to be a celebrity. Just ask the victims of <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.forbes.com\/sites\/davelewis\/2014\/09\/02\/icloud-data-breach-hacking-and-nude-celebrity-photos\/#9e72ab02de72\" target=\"_blank\">The Fappening<\/a>. But I\u2019m going to pivot and mention one of the decade&#8217;s cybersecurity fails that was actually a good thing: The <a href=\"https:\/\/www.wired.com\/2015\/08\/happened-hackers-posted-stolen-ashley-madison-data\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Ashley Madison hack<\/a>. <\/p>\n<p>Bringing to public conscious the term \u201chacktivism,\u201d these do-gooders breached the database of the website dedicated to helping married people find true love by cheating on their partners. Some 32 million adulterers\u2019 credentials and credit card information were dumped online, after which they were likely dumped by their angry spouses. There\u2019s not much else I can say here except you guys are assholes and deserved this one. The end.<\/p>\n<p><strong>CB: <\/strong>Yeah, I got nothing. Those cheaters were bad and should feel bad.<\/p>\n<h3>2016: But her emails?<\/h3>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41639\" data-permalink=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/attachment\/shutterstock_671082244\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_671082244.jpg\" data-orig-size=\"1000,667\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"shutterstock_671082244\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_671082244-300x200.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_671082244-600x400.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_671082244-600x400.jpg\" alt=\"shadow brokers\" class=\"wp-image-41639\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_671082244-600x400.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_671082244-300x200.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_671082244.jpg 1000w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p><strong>WZ: <\/strong>Look, everyone and their mother is going to say the DNC hack was the biggest cyber event of 2016. The Russians most certainly pinned the tail on the Democratic donkey, interfered in our elections, and overall made a right mess of things. There\u2019s no doubt Russia\u2019s actions cast a shadow over American democracy. But as far as global, far-reaching impact is concerned, I\u2019ve got my eye on a different blight. <\/p>\n<p>In 2016, a shady hacking group known as <a href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2017\/05\/shadow-brokers\/527778\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">the Shadow Brokers<\/a> started leaking NSA secrets, vulnerabilities, and exploits onto the Internet, embarrassing the agency, but more importantly, putting sophisticated tools in the hands of cybercriminals that would be employed over the remainder of the decade. <\/p>\n<p>Most notably, they disclosed a group of SMB vulnerabilities and their accompanying exploits, which were later used to propagate the WannaCry infection laterally through thousands of endpoints, and which are still in use today to spread deadly <a rel=\"noreferrer noopener\" aria-label=\"Emotet (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-is-back-botnet-springs-back-to-life-with-new-spam-campaign\/\" target=\"_blank\">Emotet<\/a> and <a href=\"https:\/\/blog.malwarebytes.com\/trojans\/2019\/09\/trickbot-adds-new-trick-to-its-arsenal-tampering-with-trusted-texts\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"TrickBot (opens in a new tab)\">TrickBot<\/a> infections in worm-like fashion.<\/p>\n<p>If it weren\u2019t for the cybersecurity fails caused by the Shadow Brokers, who knows? Threat actors might still be messing around with small potato consumer scams and identity theft. But with grown-up utilities in hand, they realized they could do a lot more damage to a lot more devices, and soon turned their greedy gaze to loftier goals. <\/p>\n<h3>2017: the year of the outbreak<\/h3>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41641\" data-permalink=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/attachment\/shutterstock_642409894\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_642409894.jpg\" data-orig-size=\"1000,667\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"shutterstock_642409894\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_642409894-300x200.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_642409894-600x400.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_642409894-600x400.jpg\" alt=\"wannacry\" class=\"wp-image-41641\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_642409894-600x400.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_642409894-300x200.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_642409894.jpg 1000w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p><strong>CB: <\/strong>Well, super sneaky government tool thefts are all well and good, but the impact of ransomware retooling and running wild can\u2019t be denied. In 2017, ransomware authors decided that just going after home users was becoming a little old hat, so they started targeting large organisations in a wave of outbreaks (fueled by the very exploits stolen from the NSA in 2016). Sadly for us, those organisations included many of the services we make use of on a daily basis, whose files and operations were encrypted and held up for Bitcoin ransom.<\/p>\n<p><a rel=\"noreferrer noopener\" aria-label=\"WannaCry (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/05\/how-did-wannacry-ransomworm-spread\/\" target=\"_blank\">WannaCry<\/a>, <a rel=\"noreferrer noopener\" aria-label=\"NotPetya (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/petya-esque-ransomware-is-spreading-across-the-world\/\" target=\"_blank\">NotPetya<\/a>, and <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/badrabbit-closer-look-new-version-petyanotpetya\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"BadRabbit (opens in a new tab)\">BadRabbit<\/a> were the big three ransomware epidemics of the year, but the malware made headlines time and time again as ransomware authors inched themselves into every available corner. Threat actors may have become a little less inventive during this period, but they certainly weren\u2019t resting on their laurels. <\/p>\n<p>Arguably the heaviest-hitting ransomware story of 2017 was the WannaCry attack on NHS, as \u00a392m vanished down the plughole. This was a seismic attack, the aftershocks of which are still felt today, spinning off into unexpected places that have taken on a life of their own.<\/p>\n<h3>2017: crypto fever<\/h3>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41642\" data-permalink=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/attachment\/shutterstock_1099822403\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1099822403.jpg\" data-orig-size=\"1000,667\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"shutterstock_1099822403\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1099822403-300x200.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1099822403-600x400.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1099822403-600x400.jpg\" alt=\"cybersecurity fails crypto\" class=\"wp-image-41642\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1099822403-600x400.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1099822403-300x200.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1099822403.jpg 1000w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p><strong>WZ: <\/strong>I could go with <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/09\/equifax-aftermath-how-to-protect-against-identity-theft\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Equifax here<\/a>, but come on, son. Another day, another breach. In 2017, it was safe to say that basically anyone who had ever been online had their information compromised. Which is why I will instead turn to the birth of a brand-new form of cybercrime: cryptomining.<\/p>\n<p>Bitcoin and other cryptocurrency had always been the favored tender of the black market, as it\u2019s anonymous and nearly impossible to trace. However, in 2017, crypto became more mainstream as a sudden, acute increase in value had even the beariest of bears opening cryptowallets and investing in super-niche altcoins. So naturally, cybercriminals being the vultures of the Internet, they found a way to capitalize on all this carrion by jacking the CPU\/GPU of other users\u2019 systems to generate coin.<\/p>\n<p>Starting in late 2017, we started noticing <em>hundreds of millions<\/em> of <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/10\/why-is-malwarebytes-blocking-coinhive\/\" target=\"_blank\">detections of coinhive.com<\/a>, a CPU-mining platform that\u2014while itself was a legitimate service\u2014was being abused by cybercriminals to mine users without their permission. This kicked off a <a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/04\/labs-ctnt-report-shows-shift-in-threat-landscape-to-cryptomining\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">landslide of cryptomining<\/a> activity that spawned the creation of multi-platform cryptomining malware, drive-by mining attacks, crypto-bundlers, crypto-themed scams, cryptowallet drainers, crypto crypto cryptors, and crypto.<\/p>\n<p>While cryptomining has since died down from its 2017-2018 heyday, it remains forever part of the threat landscape, and I\u2019m sure we\u2019ll be seeing much more of it as cryptocurrency and blockchain technology take hold in the next decade.<\/p>\n<h3>2018: shine\u2019s off social media<\/h3>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41643\" data-permalink=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/attachment\/shutterstock_1053127601\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1053127601.jpg\" data-orig-size=\"1000,668\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"shutterstock_1053127601\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1053127601-300x200.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1053127601-600x401.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1053127601-600x401.jpg\" alt=\"cybersecurity fails facebook\" class=\"wp-image-41643\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1053127601-600x401.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1053127601-300x200.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_1053127601.jpg 1000w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p><strong>CB: <\/strong>2018 was all about the covert use of data pulling the strings in every direction you can imagine. Data mining and digital assets plus social media makes for a cracking combination in the wrong hands, and it turns out Facebook was the place most of this war was fought and won (or lost, if you were on the receiving end).<\/p>\n<p>Cambridge Analytica, a political consulting firm based in the UK, probably knew they\u2019d walked into \u201coh, whoops\u201d territory when their offices <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.politico.eu\/article\/cambridge-analytica-hq-uk-authorities-raid\/\" target=\"_blank\">were raided in 2018<\/a>. They\u2019d been mucking around on <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Cambridge_Analytica#Elections\" target=\"_blank\">multiple elections worldwide<\/a>, but drew attention to themselves and Facebook after it was discovered that they\u2019d been <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/03\/what-facebooks-cambridge-analytica-problem-means-for-your-data\/\" target=\"_blank\">harvesting the personal information from 50 million Facebook user profiles without their permission<\/a>. The <a href=\"https:\/\/www.theguardian.com\/technology\/2019\/mar\/17\/the-cambridge-analytica-scandal-changed-the-world-but-it-didnt-change-facebook\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">repercussions<\/a> from this story continue to be felt today, as lawmakers now scrutinize Big Tech for their data privacy policies.<\/p>\n<h3>2018: data privacy becomes a thing<\/h3>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41645\" data-permalink=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/attachment\/data_privacy\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/data_privacy.jpg\" data-orig-size=\"5001,3334\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"data_privacy\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/data_privacy-300x200.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/data_privacy-600x400.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/data_privacy-600x400.jpg\" alt=\"cybersecurity fails crypto\" class=\"wp-image-41645\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/data_privacy-600x400.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/data_privacy-300x200.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p><strong>WZ:<\/strong> Actually, I have to semi-agree on Cambridge Analytica. But I see your social media problems and I raise you an entire Internet of <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/not-definitive-guide-cybersecurity-data-privacy-laws\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"data privacy (opens in a new tab)\">data privacy<\/a> issues. In 2018, users got a rude awakening into the inner workings of the tech giants they\u2019d come to love, rely on, and otherwise be addicted to. Wait, you\u2019re selling my information to pharmaceutical companies? You can actually <em>record my conversations <\/em>through my digital home assistant? Suddenly, users had to be just as wary of legitimate tech companies as they were of cybercriminals. <\/p>\n<p>The awareness of 2018 led to global action, as <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/privacy-security-world\/2018\/05\/gdpr-causes-a-flood-of-new-policies\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"GDPR (opens in a new tab)\">GDPR<\/a> was put into effect, launching a million cookie notices and EULA rewrites. Digital data privacy had always been an issue, reaching far back to pre-Y2K years, and it will continue for many decades as we contend with biometrics and genetic data. But 2018 represented a period of public \u201cwokeness\u201d that forever changed the way we build, buy, regulate, and use technology.<\/p>\n<h3>2019: the year of the triple threat<\/h3>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"41646\" data-permalink=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/attachment\/shutterstock_84954079\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_84954079.jpg\" data-orig-size=\"665,1000\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"shutterstock_84954079\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_84954079-200x300.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_84954079-399x600.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_84954079-399x600.jpg\" alt=\"cybersecurity fails triple threat\" class=\"wp-image-41646\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_84954079-399x600.jpg 399w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_84954079-200x300.jpg 200w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_84954079.jpg 665w\" sizes=\"(max-width: 399px) 100vw, 399px\" \/><\/figure>\n<p><strong>CB:<\/strong> We\u2019re too close to 2019 to be able to say conclusively what stuck and what stank, but the triple threat of <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/emotet-revisited-this-pervasive-persistent-threat-is-still-a-danger-to-businesses\/\" target=\"_blank\">Emotet<\/a>, <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/trojans\/2019\/09\/trickbot-adds-new-trick-to-its-arsenal-tampering-with-trusted-texts\/\" target=\"_blank\">TrickBot<\/a>, and <a href=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2019\/12\/threat-spotlight-the-curious-case-of-ryuk-ransomware\/\">Ryuk ransomware<\/a> caused such massive problems across a range of critical infrastructure and <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/malware\/2019\/01\/ryuk-ransomware-attacks-businesses-over-the-holidays\/\" target=\"_blank\">business services<\/a> that any 2019 listicle that doesn\u2019t feature this attack is missing the mark. If your mailbox hasn\u2019t detected the familiar twang of an <a href=\"https:\/\/www.malwarebytes.com\/emotet\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Emotet malspam<\/a> landing on the network yet, you\u2019re doing very well indeed. <\/p>\n<p>The triple threat officially saw light in 2018, but it was <em>the attack <\/em>of 2019. If there was news of a city declaring a state of emergency, a school shutting down for weeks, or a hospital shelling out thousands in ransom payment, you bet it was on account of these three devils. It\u2019s an assault from every angle, and in an alien invasion, <a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2019\/08\/ransomware-continues-assault-against-cities-and-businesses\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">this would be the part<\/a> where the hero escaped through a conveniently placed air vent.<\/p>\n<h3>Cybersecurity fail of the decade<\/h3>\n<p>All this arguing on which cybersecurity fails were most awe-inspiring, death-defying, or just plain stupid would be pointless if we didn&#8217;t wrap it up in a nice year-end bow. So, without further ado, we&#8217;ll now take our pick of the top cybersecurity fail of the decade. Drumroll please&#8230;<\/p>\n<p><strong>WZ: <\/strong>My vote is for Shadow Brokers because it set off a chain of events that allowed for cybercriminals to evolve into more sophisticated, industrialized players, essentially radically changing the threat landscape from a bunch of kids messing around in their basements to organized criminals aimed at taking down organizations, swiping millions of users&#8217; personal data and making significant profit in the process.<\/p>\n<p><strong>CB: <\/strong>My pick is the Mat Honan hack. It&#8217;s not as big, or as flashy, or as sophisticated as most of the attacks on display. But what happened to him pretty much still happens to people now as their first introduction to the world of &#8220;All my data is gone forever.&#8221; How they torched his digital existence and salted the earth is beyond brutal\u2014and, most chillingly, it was nothing personal.<\/p>\n<p>Which of these cybersecurity fails would you vote for? Sound off in the comments!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/\">A decade in cybersecurity fails: the top breaches, threats, and \u2018whoopsies\u2019 of the 2010s<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 19 Dec 2019 18:03:33 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/' title='A decade in cybersecurity fails: the top breaches, threats, and \u2018whoopsies\u2019 of the 2010s'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_705319399.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>As the 2010s come to a close, we take a snarky walk down memory lane, listing the craziest, most impactful, or simply just awful cybersecurity fails of the decade.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/awareness\/\" rel=\"category tag\">Awareness<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/ashley-madison\/\" rel=\"tag\">ashley madison<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ashley-madison-hack\/\" rel=\"tag\">ashley madison hack<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/badrabbit\/\" rel=\"tag\">BadRabbit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cambridge-analytica\/\" rel=\"tag\">cambridge analytica<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cryptolocker\/\" rel=\"tag\">cryptolocker<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cryptolocker-ransomware\/\" rel=\"tag\">cryptolocker ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-privacy\/\" rel=\"tag\">Data privacy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/edward-snowden\/\" rel=\"tag\">Edward Snowden<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/emotet\/\" rel=\"tag\">emotet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploits\/\" rel=\"tag\">exploits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/facebook\/\" rel=\"tag\">facebook<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hacktivism\/\" rel=\"tag\">hacktivism<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mat-honan\/\" rel=\"tag\">mat honan<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/notpetya\/\" rel=\"tag\">NotPetya<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nsa\/\" rel=\"tag\">NSA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nsa-spying\/\" rel=\"tag\">nsa spying<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nsa-surveillance\/\" rel=\"tag\">nsa surveillance<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nsa-tools\/\" rel=\"tag\">NSA tools<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/playstation-breach\/\" rel=\"tag\">playstation breach<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/playstation-hack\/\" rel=\"tag\">playstation hack<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ryuk\/\" rel=\"tag\">ryuk<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ryuk-ransomware\/\" rel=\"tag\">Ryuk ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/security-fails\/\" rel=\"tag\">security fails<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/shadow-brokers\/\" rel=\"tag\">shadow brokers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-media\/\" rel=\"tag\">social media<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/sony\/\" rel=\"tag\">sony<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/sony-pictures-hack\/\" rel=\"tag\">sony pictures hack<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/surveillance\/\" rel=\"tag\">surveillance<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/target-breach\/\" rel=\"tag\">target breach<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/target-hack\/\" rel=\"tag\">target hack<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trickbot\/\" rel=\"tag\">trickbot<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/triple-threat\/\" rel=\"tag\">triple threat<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wannacry\/\" rel=\"tag\">WannaCry<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/' title='A decade in cybersecurity fails: the top breaches, threats, and \u2018whoopsies\u2019 of the 2010s'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/12\/a-decade-in-cybersecurity-fails-top-breaches-threats-of-2010s\/\">A decade in cybersecurity fails: the top breaches, threats, and \u2018whoopsies\u2019 of the 2010s<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[23807,19109,15496,16066,17876,23808,23809,11063,11562,15715,10987,3589,17526,20110,12830,10626,23810,23811,20434,23812,23813,3765,19317,20562,23814,12004,1932,14224,23815,4053,11661,23816,13256,23817,12252],"class_list":["post-17261","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-ashley-madison","tag-ashley-madison-hack","tag-awareness","tag-badrabbit","tag-cambridge-analytica","tag-cryptolocker","tag-cryptolocker-ransomware","tag-data-privacy","tag-edward-snowden","tag-emotet","tag-exploits","tag-facebook","tag-hacktivism","tag-mat-honan","tag-notpetya","tag-nsa","tag-nsa-spying","tag-nsa-surveillance","tag-nsa-tools","tag-playstation-breach","tag-playstation-hack","tag-ransomware","tag-ryuk","tag-ryuk-ransomware","tag-security-fails","tag-shadow-brokers","tag-social-media","tag-sony","tag-sony-pictures-hack","tag-surveillance","tag-target-breach","tag-target-hack","tag-trickbot","tag-triple-threat","tag-wannacry"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17261"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17261\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17261"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17261"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}