SlideShare a Scribd company logo
In-Depth Report on Five
Organizations Affected by
Cyber Attacks
Photo by KATRIN BOLOVTSOVA on Pexels
● Introduction to Cyber Attacks
● Organization 1: Target Corporation
● Lessons from Target Corporation's Breach
● Organization 2: Equifax
● Lessons from Equifax's Breach
● Organization 3: Colonial Pipeline
● Lessons from Colonial Pipeline's Breach
● Organization 4: Yahoo
● Lessons from Yahoo's Breach
Agenda
Photo by Vanessa Garcia on Pexels
Definition of cyber attacks and their significance
Cyber attacks are deliberate actions aimed at compromising the confidentiality, integrity, or availability of
information systems. They can target individuals, organizations, and governments, resulting in data
breaches, financial loss, and reputational damage.
Overview of the increasing prevalence of cyber threats
As technology evolves, so do the tactics employed by cybercriminals. Recent statistics indicate that cyber
attacks have increased significantly over the past decade, with billions of records compromised annually.
Importance of studying real-world incidents
Analyzing real-world cyber attacks helps cybersecurity professionals understand vulnerabilities, improve
defense mechanisms, and develop effective response strategies. Each incident offers unique lessons that
can guide future prevention efforts.
Introduction to Cyber Attacks
Photo by Mikhail Nilov on Pexels
Description of the 2013 data breach affecting 40 million credit cards
In December 2013, Target Corporation experienced a massive data breach where attackers accessed the payment card information of approximately 40 million customers and
personal information of an additional 70 million individuals.
Attack vector: Point of Sale (POS) system compromise
The attackers infiltrated Target's network through compromised vendor credentials, installing malware on POS systems. This allowed them to capture card details as customers
made purchases.
Impact on customer trust and financial loss
The breach resulted in Target facing $162 million in expenses related to the breach response and legal costs, alongside significant damage to customer trust and loss of brand
reputation.
Organization 1: Target Corporation
Need for robust network segmentation
The breach highlighted the importance of network segmentation to limit access to sensitive data.
Isolating payment information from other network components can help contain potential breaches.
Importance of vendor management and third-party risk assessment
Companies must implement comprehensive vendor management strategies, assessing and continuously
monitoring third-party security protocols to mitigate risks associated with external partners.
Implementation of advanced threat detection tools
Investing in real-time monitoring and advanced threat detection tools can help organizations identify
anomalous activity quickly, enabling faster incident response.
Lessons from
Target
Corporation's
Breach
Overview of the 2017 breach impacting 147 million people
In 2017, Equifax, one of the largest credit bureaus, suffered a data breach in which personal
information, including Social Security numbers, birth dates, and addresses of 147 million
Americans, was compromised.
Exploitation of unpatched web application vulnerability (CVE-2017-5638)
The breach occurred due to an unpatched vulnerability in the Apache Struts web application
framework, which hackers exploited to gain access to Equifax's network.
Consequences: Legal ramifications and reputation damage
Equifax faced severe repercussions, including a settlement of up to $700 million and
significant long-term reputational harm, underscoring the societal impact of such breaches.
Organization 2: Equifax
Photo by MART PRODUCTION on Pexels
Criticality of timely software patching and updates
Organizations must prioritize patch management, ensuring software vulnerabilities are
addressed promptly to minimize exploitable entry points.
Enhancing monitoring for suspicious activities
Implementing robust monitoring tools can help detect unauthorized access or
anomalous behaviors, allowing organizations to respond swiftly to potential threats.
Establishing strong data encryption practices
Encrypting sensitive data both at rest and in transit protects it from unauthorized
access, dramatically reducing the risk associated with data breaches.
Lessons from Equifax's Breach
Photo by RDNE Stock project on Pexels
Discussion of the 2021 ransomware attack leading to fuel supply disruption
In May 2021, Colonial Pipeline was hit by a ransomware attack perpetrated by the DarkSide group, leading to a significant fuel supply chain disruption across the
East Coast of the United States.
Ransomware type: DarkSide; initial compromise via a VPN with no MFA
The attack exploited a VPN vulnerability, as the company lacked multi-factor authentication (MFA). This allowed attackers to penetrate the network and deploy
ransomware.
Economic impact and rise of fuel prices
The disruption resulted in fuel shortages and drove up prices, costing the company millions in ransom and causing widespread economic impacts.
Organization 3: Colonial Pipeline
Importance of Multi-Factor Authentication (MFA)
Implementing MFA is crucial for securing remote access and reducing the risk of credential
theft, making it significantly harder for attackers to compromise accounts.
Need for incident response planning and crisis management
Organizations should develop robust incident response plans that outline protocols for
identifying, responding to, and recovering from cyber incidents effectively.
Collaboration with governmental and private cybersecurity agencies
Fostering relationships with cybersecurity organizations and law enforcement can enhance
collaborative incident response efforts and information sharing during a breach.
Lessons from Colonial Pipeline's Breach
Photo by KATRIN BOLOVTSOVA on Pexels
Exploration of the 2013-2014 data breaches affecting 3 billion
accounts
Between 2013 and 2014, Yahoo suffered multiple breaches impacting
approximately 3 billion accounts, the largest known data breach in history,
compromising user information, including email addresses and security questions.
Methods: Phishing and state-sponsored actors
The breaches were attributed to state-sponsored actors who used phishing
techniques and exploited vulnerabilities to gain unauthorized access to Yahoo’s
systems.
Long-term impact on Yahoo's acquisition by Verizon
The massive breaches significantly diminished Yahoo's value and credibility, leading
to a reduced acquisition price by Verizon and drawing severe criticism regarding
Yahoo’s security practices.
Organization 4:
Yahoo
Need for better user authentication methods
Implementing stronger user authentication mechanisms, such as two-factor authentication, is
essential to protect accounts from unauthorized access.
Enhancing data protection and minimizing data collection
Organizations should adopt data minimization principles, collecting only necessary information
and implementing strong data protection practices to mitigate damage in case of a breach.
Regular security audits and risk assessments
Conducting frequent security audits and risk assessments helps organizations identify
vulnerabilities and ensure compliance with security policies.
Lessons from Yahoo's Breach
Photo by KATRIN BOLOVTSOVA on Pexels

More Related Content

PPTX
cyber attacks analysis top five organization affected by cyber attacks
PPTX
cyber attacks In-depth Report on five organizations affected by cyber attacks
PPTX
Baker Tilly Presents: Emerging Trends in Cybersecurity
PPTX
Analyzing Cyber-Attacks: Case Studies of Five Organizations
PDF
Cybersecurity: How to be Proactive
PPTX
Computer Network and Cyber Security Assignment 1.pptx
PPTX
Computer Network and Cyber Security Assignment 1.pptx
PPTX
Computer Network and Cyber Security Assignment 1.pptx
cyber attacks analysis top five organization affected by cyber attacks
cyber attacks In-depth Report on five organizations affected by cyber attacks
Baker Tilly Presents: Emerging Trends in Cybersecurity
Analyzing Cyber-Attacks: Case Studies of Five Organizations
Cybersecurity: How to be Proactive
Computer Network and Cyber Security Assignment 1.pptx
Computer Network and Cyber Security Assignment 1.pptx
Computer Network and Cyber Security Assignment 1.pptx

Similar to cyber attacks In-depth Report on five organizations affected by cyber attacks (20)

PDF
wp-follow-the-data
PPTX
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
PPTX
Cyberattacks.pptx
PPTX
NumaanHuq_Hackfest2015
PDF
Operational CyberSecurity Final Case Report
PPTX
ACEDS-ACFCS Cybersecurity Webcast
PDF
Cyber Threats and Network Vulnerabilities
PDF
Cyber Threats and Network Vulnerabilities (1).pdf
PPTX
2012 Breach Lessons Learned - 2013 Do Differents
PDF
Dealing with Data Breaches Amidst Changes In Technology
PDF
Breach level index_report_2017_gemalto
PDF
Risky Business
PDF
Cyber security for ia and risk 150601
PDF
Cybersecurity-Protecting-Our-Digital-World (1).pdf
PDF
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdf
PDF
INFORMATION ASSURANCE AND SECURITY 1.pdf
PDF
Data Breach Response: Before and After the Breach
PDF
Sept 2012 data security & cyber liability
PDF
Top Cybersecurity Threats Impacting Your Business in 2023
PDF
Fundamentals of information systems security ( pdf drive ) chapter 1
wp-follow-the-data
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Cyberattacks.pptx
NumaanHuq_Hackfest2015
Operational CyberSecurity Final Case Report
ACEDS-ACFCS Cybersecurity Webcast
Cyber Threats and Network Vulnerabilities
Cyber Threats and Network Vulnerabilities (1).pdf
2012 Breach Lessons Learned - 2013 Do Differents
Dealing with Data Breaches Amidst Changes In Technology
Breach level index_report_2017_gemalto
Risky Business
Cyber security for ia and risk 150601
Cybersecurity-Protecting-Our-Digital-World (1).pdf
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdf
Data Breach Response: Before and After the Breach
Sept 2012 data security & cyber liability
Top Cybersecurity Threats Impacting Your Business in 2023
Fundamentals of information systems security ( pdf drive ) chapter 1
Ad

Recently uploaded (20)

DOCX
Unit-3 cyber security network security of internet system
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
Introduction to the IoT system, how the IoT system works
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
artificial intelligence overview of it and more
PPTX
Introduction to Information and Communication Technology
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
innovation process that make everything different.pptx
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Unit-3 cyber security network security of internet system
SAP Ariba Sourcing PPT for learning material
Introduction to the IoT system, how the IoT system works
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Tenda Login Guide: Access Your Router in 5 Easy Steps
artificial intelligence overview of it and more
Introduction to Information and Communication Technology
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
innovation process that make everything different.pptx
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Power Point - Lesson 3_2.pptx grad school presentation
SASE Traffic Flow - ZTNA Connector-1.pdf
An introduction to the IFRS (ISSB) Stndards.pdf
Paper PDF World Game (s) Great Redesign.pdf
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Ad

cyber attacks In-depth Report on five organizations affected by cyber attacks

  • 1. In-Depth Report on Five Organizations Affected by Cyber Attacks Photo by KATRIN BOLOVTSOVA on Pexels
  • 2. ● Introduction to Cyber Attacks ● Organization 1: Target Corporation ● Lessons from Target Corporation's Breach ● Organization 2: Equifax ● Lessons from Equifax's Breach ● Organization 3: Colonial Pipeline ● Lessons from Colonial Pipeline's Breach ● Organization 4: Yahoo ● Lessons from Yahoo's Breach Agenda Photo by Vanessa Garcia on Pexels
  • 3. Definition of cyber attacks and their significance Cyber attacks are deliberate actions aimed at compromising the confidentiality, integrity, or availability of information systems. They can target individuals, organizations, and governments, resulting in data breaches, financial loss, and reputational damage. Overview of the increasing prevalence of cyber threats As technology evolves, so do the tactics employed by cybercriminals. Recent statistics indicate that cyber attacks have increased significantly over the past decade, with billions of records compromised annually. Importance of studying real-world incidents Analyzing real-world cyber attacks helps cybersecurity professionals understand vulnerabilities, improve defense mechanisms, and develop effective response strategies. Each incident offers unique lessons that can guide future prevention efforts. Introduction to Cyber Attacks Photo by Mikhail Nilov on Pexels
  • 4. Description of the 2013 data breach affecting 40 million credit cards In December 2013, Target Corporation experienced a massive data breach where attackers accessed the payment card information of approximately 40 million customers and personal information of an additional 70 million individuals. Attack vector: Point of Sale (POS) system compromise The attackers infiltrated Target's network through compromised vendor credentials, installing malware on POS systems. This allowed them to capture card details as customers made purchases. Impact on customer trust and financial loss The breach resulted in Target facing $162 million in expenses related to the breach response and legal costs, alongside significant damage to customer trust and loss of brand reputation. Organization 1: Target Corporation
  • 5. Need for robust network segmentation The breach highlighted the importance of network segmentation to limit access to sensitive data. Isolating payment information from other network components can help contain potential breaches. Importance of vendor management and third-party risk assessment Companies must implement comprehensive vendor management strategies, assessing and continuously monitoring third-party security protocols to mitigate risks associated with external partners. Implementation of advanced threat detection tools Investing in real-time monitoring and advanced threat detection tools can help organizations identify anomalous activity quickly, enabling faster incident response. Lessons from Target Corporation's Breach
  • 6. Overview of the 2017 breach impacting 147 million people In 2017, Equifax, one of the largest credit bureaus, suffered a data breach in which personal information, including Social Security numbers, birth dates, and addresses of 147 million Americans, was compromised. Exploitation of unpatched web application vulnerability (CVE-2017-5638) The breach occurred due to an unpatched vulnerability in the Apache Struts web application framework, which hackers exploited to gain access to Equifax's network. Consequences: Legal ramifications and reputation damage Equifax faced severe repercussions, including a settlement of up to $700 million and significant long-term reputational harm, underscoring the societal impact of such breaches. Organization 2: Equifax Photo by MART PRODUCTION on Pexels
  • 7. Criticality of timely software patching and updates Organizations must prioritize patch management, ensuring software vulnerabilities are addressed promptly to minimize exploitable entry points. Enhancing monitoring for suspicious activities Implementing robust monitoring tools can help detect unauthorized access or anomalous behaviors, allowing organizations to respond swiftly to potential threats. Establishing strong data encryption practices Encrypting sensitive data both at rest and in transit protects it from unauthorized access, dramatically reducing the risk associated with data breaches. Lessons from Equifax's Breach Photo by RDNE Stock project on Pexels
  • 8. Discussion of the 2021 ransomware attack leading to fuel supply disruption In May 2021, Colonial Pipeline was hit by a ransomware attack perpetrated by the DarkSide group, leading to a significant fuel supply chain disruption across the East Coast of the United States. Ransomware type: DarkSide; initial compromise via a VPN with no MFA The attack exploited a VPN vulnerability, as the company lacked multi-factor authentication (MFA). This allowed attackers to penetrate the network and deploy ransomware. Economic impact and rise of fuel prices The disruption resulted in fuel shortages and drove up prices, costing the company millions in ransom and causing widespread economic impacts. Organization 3: Colonial Pipeline
  • 9. Importance of Multi-Factor Authentication (MFA) Implementing MFA is crucial for securing remote access and reducing the risk of credential theft, making it significantly harder for attackers to compromise accounts. Need for incident response planning and crisis management Organizations should develop robust incident response plans that outline protocols for identifying, responding to, and recovering from cyber incidents effectively. Collaboration with governmental and private cybersecurity agencies Fostering relationships with cybersecurity organizations and law enforcement can enhance collaborative incident response efforts and information sharing during a breach. Lessons from Colonial Pipeline's Breach Photo by KATRIN BOLOVTSOVA on Pexels
  • 10. Exploration of the 2013-2014 data breaches affecting 3 billion accounts Between 2013 and 2014, Yahoo suffered multiple breaches impacting approximately 3 billion accounts, the largest known data breach in history, compromising user information, including email addresses and security questions. Methods: Phishing and state-sponsored actors The breaches were attributed to state-sponsored actors who used phishing techniques and exploited vulnerabilities to gain unauthorized access to Yahoo’s systems. Long-term impact on Yahoo's acquisition by Verizon The massive breaches significantly diminished Yahoo's value and credibility, leading to a reduced acquisition price by Verizon and drawing severe criticism regarding Yahoo’s security practices. Organization 4: Yahoo
  • 11. Need for better user authentication methods Implementing stronger user authentication mechanisms, such as two-factor authentication, is essential to protect accounts from unauthorized access. Enhancing data protection and minimizing data collection Organizations should adopt data minimization principles, collecting only necessary information and implementing strong data protection practices to mitigate damage in case of a breach. Regular security audits and risk assessments Conducting frequent security audits and risk assessments helps organizations identify vulnerabilities and ensure compliance with security policies. Lessons from Yahoo's Breach Photo by KATRIN BOLOVTSOVA on Pexels