SlideShare a Scribd company logo
In-Depth Report on Five
Organizations Affected by
Cyber Attacks
Photo by KATRIN BOLOVTSOVA on Pexels
● Introduction to Cyber Attacks
● Organization 1: Target Corporation
● Lessons from Target Corporation's Breach
● Organization 2: Equifax
● Lessons from Equifax's Breach
● Organization 3: Colonial Pipeline
● Lessons from Colonial Pipeline's Breach
● Organization 4: Yahoo
● Lessons from Yahoo's Breach
Agenda
Photo by Vanessa Garcia on Pexels
Definition of cyber attacks and their significance
Cyber attacks are deliberate actions aimed at compromising the confidentiality, integrity, or availability of
information systems. They can target individuals, organizations, and governments, resulting in data
breaches, financial loss, and reputational damage.
Overview of the increasing prevalence of cyber threats
As technology evolves, so do the tactics employed by cybercriminals. Recent statistics indicate that cyber
attacks have increased significantly over the past decade, with billions of records compromised annually.
Importance of studying real-world incidents
Analyzing real-world cyber attacks helps cybersecurity professionals understand vulnerabilities, improve
defense mechanisms, and develop effective response strategies. Each incident offers unique lessons that
can guide future prevention efforts.
Introduction to Cyber Attacks
Photo by Mikhail Nilov on Pexels
Description of the 2013 data breach affecting 40 million credit cards
In December 2013, Target Corporation experienced a massive data breach where attackers accessed the payment card information of approximately 40 million customers and
personal information of an additional 70 million individuals.
Attack vector: Point of Sale (POS) system compromise
The attackers infiltrated Target's network through compromised vendor credentials, installing malware on POS systems. This allowed them to capture card details as customers
made purchases.
Impact on customer trust and financial loss
The breach resulted in Target facing $162 million in expenses related to the breach response and legal costs, alongside significant damage to customer trust and loss of brand
reputation.
Organization 1: Target Corporation
Need for robust network segmentation
The breach highlighted the importance of network segmentation to limit access to sensitive data.
Isolating payment information from other network components can help contain potential breaches.
Importance of vendor management and third-party risk assessment
Companies must implement comprehensive vendor management strategies, assessing and continuously
monitoring third-party security protocols to mitigate risks associated with external partners.
Implementation of advanced threat detection tools
Investing in real-time monitoring and advanced threat detection tools can help organizations identify
anomalous activity quickly, enabling faster incident response.
Lessons from
Target
Corporation's
Breach
Overview of the 2017 breach impacting 147 million people
In 2017, Equifax, one of the largest credit bureaus, suffered a data breach in which personal
information, including Social Security numbers, birth dates, and addresses of 147 million
Americans, was compromised.
Exploitation of unpatched web application vulnerability (CVE-2017-5638)
The breach occurred due to an unpatched vulnerability in the Apache Struts web application
framework, which hackers exploited to gain access to Equifax's network.
Consequences: Legal ramifications and reputation damage
Equifax faced severe repercussions, including a settlement of up to $700 million and
significant long-term reputational harm, underscoring the societal impact of such breaches.
Organization 2: Equifax
Photo by MART PRODUCTION on Pexels
Criticality of timely software patching and updates
Organizations must prioritize patch management, ensuring software vulnerabilities are
addressed promptly to minimize exploitable entry points.
Enhancing monitoring for suspicious activities
Implementing robust monitoring tools can help detect unauthorized access or
anomalous behaviors, allowing organizations to respond swiftly to potential threats.
Establishing strong data encryption practices
Encrypting sensitive data both at rest and in transit protects it from unauthorized
access, dramatically reducing the risk associated with data breaches.
Lessons from Equifax's Breach
Photo by RDNE Stock project on Pexels
Discussion of the 2021 ransomware attack leading to fuel supply disruption
In May 2021, Colonial Pipeline was hit by a ransomware attack perpetrated by the DarkSide group, leading to a significant fuel supply chain disruption across the
East Coast of the United States.
Ransomware type: DarkSide; initial compromise via a VPN with no MFA
The attack exploited a VPN vulnerability, as the company lacked multi-factor authentication (MFA). This allowed attackers to penetrate the network and deploy
ransomware.
Economic impact and rise of fuel prices
The disruption resulted in fuel shortages and drove up prices, costing the company millions in ransom and causing widespread economic impacts.
Organization 3: Colonial Pipeline
Importance of Multi-Factor Authentication (MFA)
Implementing MFA is crucial for securing remote access and reducing the risk of credential
theft, making it significantly harder for attackers to compromise accounts.
Need for incident response planning and crisis management
Organizations should develop robust incident response plans that outline protocols for
identifying, responding to, and recovering from cyber incidents effectively.
Collaboration with governmental and private cybersecurity agencies
Fostering relationships with cybersecurity organizations and law enforcement can enhance
collaborative incident response efforts and information sharing during a breach.
Lessons from Colonial Pipeline's Breach
Photo by KATRIN BOLOVTSOVA on Pexels
Exploration of the 2013-2014 data breaches affecting 3 billion
accounts
Between 2013 and 2014, Yahoo suffered multiple breaches impacting
approximately 3 billion accounts, the largest known data breach in history,
compromising user information, including email addresses and security questions.
Methods: Phishing and state-sponsored actors
The breaches were attributed to state-sponsored actors who used phishing
techniques and exploited vulnerabilities to gain unauthorized access to Yahoo’s
systems.
Long-term impact on Yahoo's acquisition by Verizon
The massive breaches significantly diminished Yahoo's value and credibility, leading
to a reduced acquisition price by Verizon and drawing severe criticism regarding
Yahoo’s security practices.
Organization 4:
Yahoo
Need for better user authentication methods
Implementing stronger user authentication mechanisms, such as two-factor authentication, is
essential to protect accounts from unauthorized access.
Enhancing data protection and minimizing data collection
Organizations should adopt data minimization principles, collecting only necessary information
and implementing strong data protection practices to mitigate damage in case of a breach.
Regular security audits and risk assessments
Conducting frequent security audits and risk assessments helps organizations identify
vulnerabilities and ensure compliance with security policies.
Lessons from Yahoo's Breach
Photo by KATRIN BOLOVTSOVA on Pexels

More Related Content

PPTX
cyber attacks analysis top five organization affected by cyber attacks
pinterestjos
 
PPTX
cyber attacks In-depth Report on five organizations affected by cyber attacks
pinterestjos
 
PPTX
Baker Tilly Presents: Emerging Trends in Cybersecurity
BakerTillyConsulting
 
PPTX
Analyzing Cyber-Attacks: Case Studies of Five Organizations
Boston Institute of Analytics
 
PDF
Cybersecurity: How to be Proactive
Brown Smith Wallace
 
PPTX
Computer Network and Cyber Security Assignment 1.pptx
gkoulastudy1
 
PPTX
Computer Network and Cyber Security Assignment 1.pptx
gkoulastudy1
 
PPTX
Computer Network and Cyber Security Assignment 1.pptx
gkoulastudy1
 
cyber attacks analysis top five organization affected by cyber attacks
pinterestjos
 
cyber attacks In-depth Report on five organizations affected by cyber attacks
pinterestjos
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
BakerTillyConsulting
 
Analyzing Cyber-Attacks: Case Studies of Five Organizations
Boston Institute of Analytics
 
Cybersecurity: How to be Proactive
Brown Smith Wallace
 
Computer Network and Cyber Security Assignment 1.pptx
gkoulastudy1
 
Computer Network and Cyber Security Assignment 1.pptx
gkoulastudy1
 
Computer Network and Cyber Security Assignment 1.pptx
gkoulastudy1
 

Similar to cyber attacks analysis top five organization affected by cyber attacks (20)

PDF
wp-follow-the-data
Numaan Huq
 
PPTX
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
dhananjay80
 
PPTX
Cyberattacks.pptx
SonakshiMundra
 
PPTX
NumaanHuq_Hackfest2015
Numaan Huq
 
PDF
Operational CyberSecurity Final Case Report
James Konderla
 
PPTX
ACEDS-ACFCS Cybersecurity Webcast
Logikcull.com
 
PDF
Cyber Threats and Network Vulnerabilities
yams12611
 
PDF
Cyber Threats and Network Vulnerabilities (1).pdf
Rosy G
 
PPTX
2012 Breach Lessons Learned - 2013 Do Differents
Resilient Systems
 
PDF
Dealing with Data Breaches Amidst Changes In Technology
CSCJournals
 
PDF
Breach level index_report_2017_gemalto
Jonas Mercier
 
PDF
Risky Business
Samantha Park
 
PDF
Cyber security for ia and risk 150601
Grant Barker
 
PDF
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdf
Richard Smiraldi
 
PDF
INFORMATION ASSURANCE AND SECURITY 1.pdf
EarlvonDeiparine1
 
PDF
Data Breach Response: Before and After the Breach
Financial Poise
 
PDF
Sept 2012 data security & cyber liability
DFickett
 
PDF
Top Cybersecurity Threats Impacting Your Business in 2023
basilmph
 
PDF
Fundamentals of information systems security ( pdf drive ) chapter 1
newbie2019
 
PDF
Key note in nyc the next breach target and how oracle can help - nyoug
Ulf Mattsson
 
wp-follow-the-data
Numaan Huq
 
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
dhananjay80
 
Cyberattacks.pptx
SonakshiMundra
 
NumaanHuq_Hackfest2015
Numaan Huq
 
Operational CyberSecurity Final Case Report
James Konderla
 
ACEDS-ACFCS Cybersecurity Webcast
Logikcull.com
 
Cyber Threats and Network Vulnerabilities
yams12611
 
Cyber Threats and Network Vulnerabilities (1).pdf
Rosy G
 
2012 Breach Lessons Learned - 2013 Do Differents
Resilient Systems
 
Dealing with Data Breaches Amidst Changes In Technology
CSCJournals
 
Breach level index_report_2017_gemalto
Jonas Mercier
 
Risky Business
Samantha Park
 
Cyber security for ia and risk 150601
Grant Barker
 
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdf
Richard Smiraldi
 
INFORMATION ASSURANCE AND SECURITY 1.pdf
EarlvonDeiparine1
 
Data Breach Response: Before and After the Breach
Financial Poise
 
Sept 2012 data security & cyber liability
DFickett
 
Top Cybersecurity Threats Impacting Your Business in 2023
basilmph
 
Fundamentals of information systems security ( pdf drive ) chapter 1
newbie2019
 
Key note in nyc the next breach target and how oracle can help - nyoug
Ulf Mattsson
 
Ad

Recently uploaded (20)

PPTX
Contractor Management Platform and Software Solution for Compliance
SHEQ Network Limited
 
PDF
Protecting the Digital World Cyber Securit
dnthakkar16
 
PPTX
Visualising Data with Scatterplots in IBM SPSS Statistics.pptx
Version 1 Analytics
 
PDF
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
PDF
Key Features to Look for in Arizona App Development Services
Net-Craft.com
 
PDF
Summary Of Odoo 18.1 to 18.4 : The Way For Odoo 19
CandidRoot Solutions Private Limited
 
PDF
Exploring AI Agents in Process Industries
amoreira6
 
PPTX
Role Of Python In Programing Language.pptx
jaykoshti048
 
PDF
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
PDF
49785682629390197565_LRN3014_Migrating_the_Beast.pdf
Abilash868456
 
PPT
Why Reliable Server Maintenance Service in New York is Crucial for Your Business
Sam Vohra
 
PPTX
Odoo Integration Services by Candidroot Solutions
CandidRoot Solutions Private Limited
 
PPTX
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
PPTX
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
PDF
On Software Engineers' Productivity - Beyond Misleading Metrics
Romén Rodríguez-Gil
 
PDF
Applitools Platform Pulse: What's New and What's Coming - July 2025
Applitools
 
PDF
Immersive experiences: what Pharo users do!
ESUG
 
PDF
ChatPharo: an Open Architecture for Understanding How to Talk Live to LLMs
ESUG
 
PPTX
Maximizing Revenue with Marketo Measure: A Deep Dive into Multi-Touch Attribu...
bbedford2
 
PPTX
classification of computer and basic part of digital computer
ravisinghrajpurohit3
 
Contractor Management Platform and Software Solution for Compliance
SHEQ Network Limited
 
Protecting the Digital World Cyber Securit
dnthakkar16
 
Visualising Data with Scatterplots in IBM SPSS Statistics.pptx
Version 1 Analytics
 
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
Key Features to Look for in Arizona App Development Services
Net-Craft.com
 
Summary Of Odoo 18.1 to 18.4 : The Way For Odoo 19
CandidRoot Solutions Private Limited
 
Exploring AI Agents in Process Industries
amoreira6
 
Role Of Python In Programing Language.pptx
jaykoshti048
 
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
49785682629390197565_LRN3014_Migrating_the_Beast.pdf
Abilash868456
 
Why Reliable Server Maintenance Service in New York is Crucial for Your Business
Sam Vohra
 
Odoo Integration Services by Candidroot Solutions
CandidRoot Solutions Private Limited
 
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
On Software Engineers' Productivity - Beyond Misleading Metrics
Romén Rodríguez-Gil
 
Applitools Platform Pulse: What's New and What's Coming - July 2025
Applitools
 
Immersive experiences: what Pharo users do!
ESUG
 
ChatPharo: an Open Architecture for Understanding How to Talk Live to LLMs
ESUG
 
Maximizing Revenue with Marketo Measure: A Deep Dive into Multi-Touch Attribu...
bbedford2
 
classification of computer and basic part of digital computer
ravisinghrajpurohit3
 
Ad

cyber attacks analysis top five organization affected by cyber attacks

  • 1. In-Depth Report on Five Organizations Affected by Cyber Attacks Photo by KATRIN BOLOVTSOVA on Pexels
  • 2. ● Introduction to Cyber Attacks ● Organization 1: Target Corporation ● Lessons from Target Corporation's Breach ● Organization 2: Equifax ● Lessons from Equifax's Breach ● Organization 3: Colonial Pipeline ● Lessons from Colonial Pipeline's Breach ● Organization 4: Yahoo ● Lessons from Yahoo's Breach Agenda Photo by Vanessa Garcia on Pexels
  • 3. Definition of cyber attacks and their significance Cyber attacks are deliberate actions aimed at compromising the confidentiality, integrity, or availability of information systems. They can target individuals, organizations, and governments, resulting in data breaches, financial loss, and reputational damage. Overview of the increasing prevalence of cyber threats As technology evolves, so do the tactics employed by cybercriminals. Recent statistics indicate that cyber attacks have increased significantly over the past decade, with billions of records compromised annually. Importance of studying real-world incidents Analyzing real-world cyber attacks helps cybersecurity professionals understand vulnerabilities, improve defense mechanisms, and develop effective response strategies. Each incident offers unique lessons that can guide future prevention efforts. Introduction to Cyber Attacks Photo by Mikhail Nilov on Pexels
  • 4. Description of the 2013 data breach affecting 40 million credit cards In December 2013, Target Corporation experienced a massive data breach where attackers accessed the payment card information of approximately 40 million customers and personal information of an additional 70 million individuals. Attack vector: Point of Sale (POS) system compromise The attackers infiltrated Target's network through compromised vendor credentials, installing malware on POS systems. This allowed them to capture card details as customers made purchases. Impact on customer trust and financial loss The breach resulted in Target facing $162 million in expenses related to the breach response and legal costs, alongside significant damage to customer trust and loss of brand reputation. Organization 1: Target Corporation
  • 5. Need for robust network segmentation The breach highlighted the importance of network segmentation to limit access to sensitive data. Isolating payment information from other network components can help contain potential breaches. Importance of vendor management and third-party risk assessment Companies must implement comprehensive vendor management strategies, assessing and continuously monitoring third-party security protocols to mitigate risks associated with external partners. Implementation of advanced threat detection tools Investing in real-time monitoring and advanced threat detection tools can help organizations identify anomalous activity quickly, enabling faster incident response. Lessons from Target Corporation's Breach
  • 6. Overview of the 2017 breach impacting 147 million people In 2017, Equifax, one of the largest credit bureaus, suffered a data breach in which personal information, including Social Security numbers, birth dates, and addresses of 147 million Americans, was compromised. Exploitation of unpatched web application vulnerability (CVE-2017-5638) The breach occurred due to an unpatched vulnerability in the Apache Struts web application framework, which hackers exploited to gain access to Equifax's network. Consequences: Legal ramifications and reputation damage Equifax faced severe repercussions, including a settlement of up to $700 million and significant long-term reputational harm, underscoring the societal impact of such breaches. Organization 2: Equifax Photo by MART PRODUCTION on Pexels
  • 7. Criticality of timely software patching and updates Organizations must prioritize patch management, ensuring software vulnerabilities are addressed promptly to minimize exploitable entry points. Enhancing monitoring for suspicious activities Implementing robust monitoring tools can help detect unauthorized access or anomalous behaviors, allowing organizations to respond swiftly to potential threats. Establishing strong data encryption practices Encrypting sensitive data both at rest and in transit protects it from unauthorized access, dramatically reducing the risk associated with data breaches. Lessons from Equifax's Breach Photo by RDNE Stock project on Pexels
  • 8. Discussion of the 2021 ransomware attack leading to fuel supply disruption In May 2021, Colonial Pipeline was hit by a ransomware attack perpetrated by the DarkSide group, leading to a significant fuel supply chain disruption across the East Coast of the United States. Ransomware type: DarkSide; initial compromise via a VPN with no MFA The attack exploited a VPN vulnerability, as the company lacked multi-factor authentication (MFA). This allowed attackers to penetrate the network and deploy ransomware. Economic impact and rise of fuel prices The disruption resulted in fuel shortages and drove up prices, costing the company millions in ransom and causing widespread economic impacts. Organization 3: Colonial Pipeline
  • 9. Importance of Multi-Factor Authentication (MFA) Implementing MFA is crucial for securing remote access and reducing the risk of credential theft, making it significantly harder for attackers to compromise accounts. Need for incident response planning and crisis management Organizations should develop robust incident response plans that outline protocols for identifying, responding to, and recovering from cyber incidents effectively. Collaboration with governmental and private cybersecurity agencies Fostering relationships with cybersecurity organizations and law enforcement can enhance collaborative incident response efforts and information sharing during a breach. Lessons from Colonial Pipeline's Breach Photo by KATRIN BOLOVTSOVA on Pexels
  • 10. Exploration of the 2013-2014 data breaches affecting 3 billion accounts Between 2013 and 2014, Yahoo suffered multiple breaches impacting approximately 3 billion accounts, the largest known data breach in history, compromising user information, including email addresses and security questions. Methods: Phishing and state-sponsored actors The breaches were attributed to state-sponsored actors who used phishing techniques and exploited vulnerabilities to gain unauthorized access to Yahoo’s systems. Long-term impact on Yahoo's acquisition by Verizon The massive breaches significantly diminished Yahoo's value and credibility, leading to a reduced acquisition price by Verizon and drawing severe criticism regarding Yahoo’s security practices. Organization 4: Yahoo
  • 11. Need for better user authentication methods Implementing stronger user authentication mechanisms, such as two-factor authentication, is essential to protect accounts from unauthorized access. Enhancing data protection and minimizing data collection Organizations should adopt data minimization principles, collecting only necessary information and implementing strong data protection practices to mitigate damage in case of a breach. Regular security audits and risk assessments Conducting frequent security audits and risk assessments helps organizations identify vulnerabilities and ensure compliance with security policies. Lessons from Yahoo's Breach Photo by KATRIN BOLOVTSOVA on Pexels