Top 5 Hack Attacks in December that Bid Farewell to 2014

Reading Time: 3 minutes

The tech geeks would be thanking the tech Gods for the wrath of 2014 is over now. It was a horrible year for the cyber world. The fury of cybercrimes lasted throughout the year and proved that nobody can roam freely in the realms of internet.

From the hack of iCloud, Yahoo and eBay to the hack of Sony Entertainment, this year has witnessed some of the high-profile hack attacks. The hackers kept coming at the users and did not give them a fighting chance. December was the same as the rest of the months and experienced more cybercrimes.

Out of the many cyberattacks, we are going to share the top 5 hack attacks of December 2014.

 

(1) The Sony Hack Fiasco

The Sony Entertainment hack attack is one of the most talked-about cyber incidents of 2014. Even though, the servers of Sony were breached in late November, the story keeps unfolding as days pass by. According to the FBI, North Korea was behind the attacks.

FBI suggested that North Korea did so because of a movie “The Interview” that mocked the North Korean President. The movie was made under the banner of Sony and Sony had dropped the idea to release it until President Obama jumped in and said that he was “disappointed” with the actions of Sony Entertainment.

Even though, the FBI isn’t 100% sure about the identity of the hackers, this hack attack has definitely resulted in the growth of tension between the US and North Korea.

 

(2) The Hack of Nuclear Plants of South Korea

The hack attacks of the nuclear plants of South Korea has caused a massive panic across the country and rightly so. A hacking group, based in Hawaii, tweeted to carry out a “second wave of destruction”. The Vice Minister, though, said that the hackers got the access to the files that were already available on the internet.

His statement did not come in handy, because it left people thinking why the information of nuclear reactors of South Korea was available on the internet in first place? The hacking group has recently threatened the residents living near the nuclear plants to stay away from them in the coming months. South Korea has apparently held some cyberdrills and has increased the security since the hack attacks.

 

(3) German Politician’s Fingerprints Hacked

A hacking group, Chaos Computer Club, claimed that it had hacked the fingerprints of German Defense Minister, Ursula von der Leyen using her photos taken at different press conferences. Jan Krissler, a member of the hacking group, while speaking at a seminar claimed that he and his friends had done it using commercial software.

Unlike the other fingerprints hack, where the hackers used tapes, or scanners or made use of the plastic material to gain access to the fingerprints, Krissler along with his group used several pictures of Ursula von der Leyen that were taken from different angles.

He claimed that the pictures were taken from a standard picture camera and joked that the politicians should wear gloves while attending the press conferences in future.

 

(4) 13K Passwords and Credit Card Details Leaked

Several hacking groups have claimed to breach the servers of Amazon, PlayStation, Xbox and many other online stores. According to the initial reports, the hackers made available the details of 13,000 users including their passwords and credit card details.

The hackers also released a pirated version of The Interview and made the details of subscribers of pornography websites available on the internet. The servers of Xbox and PlayStation were rattled with DDoS attacks and children were left in tears after they were unable to connect to the servers of their gaming networks.

 

(5) ICANN Hack

If you are wondering what ICANN is, it is a non-profit organization, Internet Corporation for Assigned Names and Numbers that keeps tracks of all the domains of global websites. ICANN revealed in a statement released in December, that it became the subject of intrusion first time in November.

Even though the organization claims that the attack did not have a direct impact on a key department that looks after the global operations of the networks. The hackers used “spear phishing” to access the email addresses and the infrastructure of public and the internal networks.

 

How you can Protect Yourself?

The increasing threats of cybercrimes have compelled the daily internet users to opt for services that provide them maximum security while browsing the internet. A VPN can help you protect your device identity, your online identity from the hackers and phishers.

A VPN provides strong encryption support to all its users to ensure all the data transmitted through the networks is safe and secure. Plus, it gives them access to the blocked websites and streaming services as well.

RankProvidersPrice ($)DiscountMore Info
1
PureVPN
Editor's Choice
 $10.95 
$3.29Per Month
70% Off
2 Year Deal
2
NordVPN
 $11.95 
$3.99Per Month
66% Off
2 Years Plan
3
Surfshark
 $11.95 
$1.99Per Month
83% Off
2 Years Deal
4
CyberGhost
 $11.99 
$3.50Per Month
73% Off
6 months Free
5
ExpressVPN
$8.32Per Month
35% OFF
No Exclusive Offer
 

Conclusion

It hasn’t been a kind year for the cyber security agencies. They had to deal with punches thrown at them by the cybercriminals. December was no different and it brought an end to what would be called a gloomy year for the cyber industry.

Even though, the hackers are countering the users with their continuous strikes, the users can counter-attack them with VPNs in their devices, because they do not only protect them but also make them invisible to the eyes of hackers and other cybercriminals.

Related Articles

Humayoun Khan

Humayoun Khan

Author
All Posts by Humayoun Khan

Humayoun Khan's Biography :


When Humayoun Ahmed Khan is not busy daydreaming about his ideal vacations, he likes to keep himself busy by learning and writing about latest technologies. New to the world of IT, still better than many who have been in this industry for years. Just kidding. He blogs here to bring the latest news from the virtual world.


Leave a Reply

Your email address will not be published. Required fields are marked *

By submitting this form you agree to our Terms of service and Privacy Policy