Microsoft hack affects nearly 100 organizations worldwide

What's a cyber attack?, How hackers attack computers, Email is still a vulnerability, Morris Worm, MafiaBoy, Google China, Jonathan James, Phone lines blocked to win car, Scientology, Solar Sunrise, Melissa virus, 2002 internet attack, Credit card galore, US Treasury

A major cyber espionage campaign exploiting a previously unknown vulnerability in Microsoft’s self-hosted SharePoint software has compromised nearly 100 organizations, according to cybersecurity firms Eye Security and the Shadowserver Foundation.

On July 19, Microsoft warned that hackers were actively targeting its self-hosted SharePoint servers, though cloud-based versions were not affected. The previously unknown flaw allows attackers to break into systems and stay hidden inside. The cybersecurity firm Eye Security discovered the breach a day earlier and said the victim count could grow as the attack method becomes widely known.

Though the affected organizations remain unnamed, national authorities have been notified. The Shadowserver Foundation confirmed approximately 100 victims—mostly in the United States and Germany—including government agencies.

Cybercrime has become a massive global industry and, despite ongoing efforts by governments and corporations to prevent these attacks, history shows that stopping them is no easy task. Explore the following gallery to learn about some of the most notorious cyberattacks in history.

What's a cyber attack?

What's a cyber attack?, How hackers attack computers, Email is still a vulnerability, Morris Worm, MafiaBoy, Google China, Jonathan James, Phone lines blocked to win car, Scientology, Solar Sunrise, Melissa virus, 2002 internet attack, Credit card galore, US Treasury

They are attacks made from one or more computers, toward another computer, group of computers, or network.

How hackers attack computers

What's a cyber attack?, How hackers attack computers, Email is still a vulnerability, Morris Worm, MafiaBoy, Google China, Jonathan James, Phone lines blocked to win car, Scientology, Solar Sunrise, Melissa virus, 2002 internet attack, Credit card galore, US Treasury

Hackers use a variety of methods to conduct cyber attacks. They can operate alone or in groups, launching coordinated attacks.

Email is still a vulnerability

What's a cyber attack?, How hackers attack computers, Email is still a vulnerability, Morris Worm, MafiaBoy, Google China, Jonathan James, Phone lines blocked to win car, Scientology, Solar Sunrise, Melissa virus, 2002 internet attack, Credit card galore, US Treasury

According to a report from JumpCloud, 94% of malware (viruses, trojans, worms, etc.) is delivered by email.

Morris Worm

What's a cyber attack?, How hackers attack computers, Email is still a vulnerability, Morris Worm, MafiaBoy, Google China, Jonathan James, Phone lines blocked to win car, Scientology, Solar Sunrise, Melissa virus, 2002 internet attack, Credit card galore, US Treasury

The estimated damage was US$10 to US$100 million.

MafiaBoy

What's a cyber attack?, How hackers attack computers, Email is still a vulnerability, Morris Worm, MafiaBoy, Google China, Jonathan James, Phone lines blocked to win car, Scientology, Solar Sunrise, Melissa virus, 2002 internet attack, Credit card galore, US Treasury

The attacked websites included Amazon, CNN, eBay, and Yahoo!. The attacks resulted in an estimated damage of $US1.7 billion.

Google China

What's a cyber attack?, How hackers attack computers, Email is still a vulnerability, Morris Worm, MafiaBoy, Google China, Jonathan James, Phone lines blocked to win car, Scientology, Solar Sunrise, Melissa virus, 2002 internet attack, Credit card galore, US Treasury

The Chinese government was suspected of being behind the attack. In 2010, Google relocated its servers to Hong Kong.

Jonathan James

What's a cyber attack?, How hackers attack computers, Email is still a vulnerability, Morris Worm, MafiaBoy, Google China, Jonathan James, Phone lines blocked to win car, Scientology, Solar Sunrise, Melissa virus, 2002 internet attack, Credit card galore, US Treasury

This allowed him to steal NASA software worth US$1.7 million. The systems were impacted for three weeks, costing NASA US$41,000. Jonathan James committed suicide in 2008.

Phone lines blocked to win car

What's a cyber attack?, How hackers attack computers, Email is still a vulnerability, Morris Worm, MafiaBoy, Google China, Jonathan James, Phone lines blocked to win car, Scientology, Solar Sunrise, Melissa virus, 2002 internet attack, Credit card galore, US Treasury

He successfully blocked any other callers and eventually won the car. He was later sentenced to five years in prison.

Scientology

What's a cyber attack?, How hackers attack computers, Email is still a vulnerability, Morris Worm, MafiaBoy, Google China, Jonathan James, Phone lines blocked to win car, Scientology, Solar Sunrise, Melissa virus, 2002 internet attack, Credit card galore, US Treasury

This was just one of many attacks by the group known as 'Anonymous.'

Solar Sunrise

What's a cyber attack?, How hackers attack computers, Email is still a vulnerability, Morris Worm, MafiaBoy, Google China, Jonathan James, Phone lines blocked to win car, Scientology, Solar Sunrise, Melissa virus, 2002 internet attack, Credit card galore, US Treasury

The US government first suspected that Iraqi operatives were behind the cyber attack.

Melissa virus

What's a cyber attack?, How hackers attack computers, Email is still a vulnerability, Morris Worm, MafiaBoy, Google China, Jonathan James, Phone lines blocked to win car, Scientology, Solar Sunrise, Melissa virus, 2002 internet attack, Credit card galore, US Treasury

The virus has reportedly caused about US$1.1 billion in damages worldwide.

2002 internet attack

What's a cyber attack?, How hackers attack computers, Email is still a vulnerability, Morris Worm, MafiaBoy, Google China, Jonathan James, Phone lines blocked to win car, Scientology, Solar Sunrise, Melissa virus, 2002 internet attack, Credit card galore, US Treasury

This was one of the the most complex cyber attacks in history, and could have had disastrous consequences if it had lasted for more than one hour.

Credit card galore

What's a cyber attack?, How hackers attack computers, Email is still a vulnerability, Morris Worm, MafiaBoy, Google China, Jonathan James, Phone lines blocked to win car, Scientology, Solar Sunrise, Melissa virus, 2002 internet attack, Credit card galore, US Treasury

Gonzalez then reportedly spent US$75,000 on a birthday party. This is still the biggest card fraud in history.

Paypal

What's a cyber attack?, How hackers attack computers, Email is still a vulnerability, Morris Worm, MafiaBoy, Google China, Jonathan James, Phone lines blocked to win car, Scientology, Solar Sunrise, Melissa virus, 2002 internet attack, Credit card galore, US Treasury

As a result, several individual users boycotted Paypal and hackers launched an attack on the company. The estimated damage was approximately US$4.5 million.

Stuxnet

What's a cyber attack?, How hackers attack computers, Email is still a vulnerability, Morris Worm, MafiaBoy, Google China, Jonathan James, Phone lines blocked to win car, Scientology, Solar Sunrise, Melissa virus, 2002 internet attack, Credit card galore, US Treasury

Iran blamed the United States and Israel for the attacks.

US Treasury

What's a cyber attack?, How hackers attack computers, Email is still a vulnerability, Morris Worm, MafiaBoy, Google China, Jonathan James, Phone lines blocked to win car, Scientology, Solar Sunrise, Melissa virus, 2002 internet attack, Credit card galore, US Treasury

A Chinese state sponsored hacker infiltrated the US Treasury Department's systems in early December 2024, gaining access to employee workstations and certain unclassified documents, according to American officials.

What's a cyber attack?, How hackers attack computers, Email is still a vulnerability, Morris Worm, MafiaBoy, Google China, Jonathan James, Phone lines blocked to win car, Scientology, Solar Sunrise, Melissa virus, 2002 internet attack, Credit card galore, US Treasury

The Treasury Department described the breach as a "major incident" and is currently working with the FBI, amongst other agencies, to investigate the hack's impact.