diff --git a/SQL-injection/SQL_3.txt.xz b/SQL-injection/SQL_3.txt.xz
new file mode 100644
index 00000000..4e6367f4
Binary files /dev/null and b/SQL-injection/SQL_3.txt.xz differ
diff --git a/dns-records/README.md b/dns-records/README.md
index a1121d50..6518395f 100644
--- a/dns-records/README.md
+++ b/dns-records/README.md
@@ -1,23 +1,24 @@
| _File Name_ | _Description of Contents_ |
|:----------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------
-| bind9-rec-types | [BIND9](http://bind9.net) record types according to `named-rrchecker -T`
-| bind-chaos-txt | defined by default `CHAOS` `TXT` records in [ISC](https://www.isc.org/) BIND name daemon
-| chaos-txt-rdata | all well-known `CHAOS` `TXT` records including non-BIND names
-| chaos-txt-extra | records from `chaos-txt-rdata` along with some additional names and extensions for scanning/enumeration purposes
-| dig-numeric-types | set arbitrary [dig](https://wikipedia.org/wiki/Dig_(command) ) types with a string representing 16 bits
-| dig-record-types | record types for the `IN` (INternet) resource record class
-| dnsmasq-chaos-txt | `CHAOS` `TXT` records specific to the [dnsmasq](http://www.thekelleys.org.uk/dnsmasq/doc.html) software
-| example-in-db | example IN class zone database from [BIND](https://www.isc.org/downloads/bind/) source tree under `bin/tests/system`
-| examplecom-in-soa | zone file with `IN SOA` record for `example.com.`
-| iana-record-types | record type strings as specified by [IANA](https://iana.org)
-| in-srv-protocols | protocol names defined by [`IN SRV`] resource records
-| in-srv-services | service names defined by `IN SRV` resource records from [NMap](https://nmap.org) source tree data of [NSE script dns-srv-enum](https://nmap.org/nsedoc/scripts/dns-srv-enum.html)
-| nsupdate-record-types | record types used in [nsupdate](https://wikipedia.org/wiki/Nsupdate) protocol messages
-| record-classes-long | all record class strings as specified by [IANA](https://iana.org)
-| record-types-in | record types specific to the `IN` class
-| record-types-long | all record type strings specified by [IANA](https://iana.org) regardless of class
-| root-zone-records | [resource records](https://wikipedia.org/wiki/Domain_Name_System#DNS_resource_records) of varying types for top-level domains in the [DNS root zone](https://wikipedia.org/wiki/DNS_root_zone)
-| suspect-networks-zone | [DNS RPZ](https://dnsrpz.info/ "DNS Response Policy Zones") for data from
-| header-flag-codes | DNS query header flag field as defined by [RFC1035 section 4.1.1](https://tools.ietf.org/html/rfc1035#section-4.1.1)
+| [bind9-rec-types](bind9-rec-types.txt) | [BIND9](http://bind9.net) record types according to `named-rrchecker -T`
+| [bind-chaos-txt](bind-chaos-txt.txt) | defined by default `CHAOS` `TXT` records in [ISC](https://www.isc.org/) BIND name daemon
+| [chaos-txt-rdata](chaos-txt-rdata.txt) | all well-known `CHAOS` `TXT` records including non-BIND names
+| [chaos-txt-extra](chaos-txt-extra.txt) | records from `chaos-txt-rdata` along with some additional names and extensions for scanning/enumeration purposes
+| [dig-numeric-types](dig-numeric-types.txt) | set arbitrary [dig](https://wikipedia.org/wiki/Dig_(command) ) types with a string representing 16 bits
+| [dig-record-types](dig-record-types.txt) | record types for the `IN` (INternet) resource record class
+| [dnsmasq-chaos-txt](dnsmasq-chaos.txt) | `CHAOS` `TXT` records specific to the [dnsmasq](http://www.thekelleys.org.uk/dnsmasq/doc.html) software
+| [example-in-db](example-in-db.zone) | example IN class zone database from [BIND](https://www.isc.org/downloads/bind/) source tree under `bin/tests/system`
+| [examplecom-in-soa](examplecom-in-soa.zone) | zone file with `IN SOA` record for `example.com.`
+| [iana-record-types](iana-record-types.txt) | record type strings as specified by [IANA](https://iana.org)
+| [in-srv-protocols](in-srv-protocols.txt) | protocol names defined by [`IN SRV`] resource records
+| [in-srv-services](in-srv-services.txt) | service names defined by `IN SRV` resource records from [NMap](https://nmap.org) source tree data of [NSE script dns-srv-enum](https://nmap.org/nsedoc/scripts/dns-srv-enum.html)
+| [nsupdate-record-types](nsupdate-record-types.txt) | record types used in [nsupdate](https://wikipedia.org/wiki/Nsupdate) protocol messages
+| [record-classes-long](record-classes-long.txt) | all record class strings as specified by [IANA](https://iana.org)
+| [record-types-in](record-types-in.txt) | record types specific to the `IN` class
+| [record-types-long](record-types-long.txt) | all record type strings specified by [IANA](https://iana.org) regardless of class
+| [root-zone-records](root-zone-records.txt.xz) | [resource records](https://wikipedia.org/wiki/Domain_Name_System#DNS_resource_records) of varying types for top-level domains in the [DNS root zone](https://wikipedia.org/wiki/DNS_root_zone)
+| [suspect-networks-zone](suspect-networks-zone.rpz) | [DNS RPZ](https://dnsrpz.info/ "DNS Response Policy Zones") for data from
+| [header-flag-codes](header-flag-codes.txt) | DNS query header flag field as defined by [RFC1035 section 4.1.1](https://tools.ietf.org/html/rfc1035#section-4.1.1)
* * *
+
diff --git a/owasp-data/owasp-incident-database.csv b/owasp-data/owasp-incident-database.csv
deleted file mode 100755
index 86fca103..00000000
--- a/owasp-data/owasp-incident-database.csv
+++ /dev/null
@@ -1,4531 +0,0 @@
-
-
-
-
-{
-}
-1999-1,WHID 1999-1: eBay downplays security hole,A very early XSS issue at eBay. Interesting historically as it seems that at the time the term XSS was not yet in use.,http://packetstormsecurity.org/9904-exploits/ebayla.txt,4/4/2006,Cross Site Scripting (XSS),Improper Output Handling,Session Hijacking,Retail,,No,,,,,,,,
-1-For a search engine, it shows a bunch of keywords (cialis, viagra, movie downloads, etc)
-1. Hacker starts online chat session with Register.com representative, claiming to be an agent of Baidu.
-1) The URL from cnn.com might give the impression that there was a genuine CNN-worthy story to be found
-2000-2,WHID 2000-2: IKEA exposes customer information on catalog site,"Error message revealed a database file location, which could be downloaded.",http://news.com.com/2100-1017-245372.html?legacy=cnet,9/6/2000,Unintentional Information Disclosure,Insufficient Authentication,Leakage of Information,Retail,,No,,,,,,,,
-2000-3,WHID 2000-3: Gaffe at Amazon leaves email addresses exposed,"E-mail addresses of other customers displayed by mistake, no hacking was required",http://news.com.com/2100-1017-245387.html?legacy=cnet,9/6/2000,Abuse of Functionality,Application Misconfiguration,Leakage of Information,Retail,USA,No,,,,,,,,
-2000-4,WHID 2000-4: Sensitive files left unprotected on Western Union's Web,Sensitive files were left in a publicly accessible directory during a maintenance window,http://news.com.com/2100-1023-245525.html?legacy=cnet,9/10/2000,Unintentional Information Disclosure,Insufficient Authorization,Leakage of Information,Finance,USA,No,,,,,,,,
-2000-5,WHID 2000-5: Eve.com exposes customers order information,View other customers orders by changing a sequential number within a URL parameter,http://news.com.com/2100-1017-245700.html?legacy=cnet,9/13/2000,Credential/Session Prediction,Insufficient Authorization,Leakage of Information,Retail,,No,,,,,,,,
-2000-6,WHID 2000-6: Inforeading.com defacement using command injection,Executing local commands using URL parameters,http://www.inforeading.com/library/infoarticles/InfoReading/logs/deface/02.txt,12/15/2000,OS Commanding,Improper Input Handling,Defacement,Entertainment,,No,,,,,,,,
-2001-1,WHID 2001-1: Travelocity exposes customer information,Sensitive files were left in a publicly accessible directory of a new web server install,http://news.com.com/2100-1017-251344.html?legacy=cnet,1/22/2001,Predictable Resource Location,Insufficient Authorization,Disclosure Only,Hospitality,,No,,,,,,,,
-2001-2,WHID 2001-2: Computer E-Retailer Exposes Credit Card Numbers,View other orders by changing a sequential parameter number. Security was provided by client side JavaScript,"http://www.extremetech.com/article2/0,3973,103782,00.asp",6/18/2001,Predictable Resource Location,Insufficient Authorization,Disclosure Only,Retail,,No,,,,,,,,
-2001-3,WHID 2001-3: Persistent XSS in Hotmail,Persistent XSS HTML Injection inside an HTML email message to hotmail,http://www.usatoday.com/tech/news/2001-08-31-hotmail-security.htm,8/31/2001,Cross Site Scripting (XSS),Improper Output Handling,Disclosure Only,Service Providers,,No,,,,,,,,
-2001-4,WHID 2001-4: Hacked Web site damaged PCs in Japan,"Users who visited the Price Lotto site using Microsoft's IE (Internet Explorer) 4.x and 5.x, automatically downloaded malicious JavaScript that was programmed to alter the software configuration of their PCs.",http://www.computerworld.com.au/article/52716/hacked_web_site_damaged_pcs_japan/,8/22/2001,Cross Site Scripting (XSS),Improper Output Handling,Planting of Malware,Retail,,No,,,,,,,,
-2001-5,WHID 2001-5: Privacy hole found in Verizon Wireless Web site,The privacy hole affected users who logged on to the Verizon Wireless Web site and used the My Account feature to view or change their cell phone billing and account information. The Web site address for the feature assigns session identifications sequentially as each user logs in which allows for forceful browsing.,"http://www.computerworld.com/securitytopics/security/privacy/story/0,10801,63587,00.html",9/6/2001,Credential/Session Prediction,Insufficient Authorization,Disclosure Only,Service Providers,,No,,,,,,,,
-2001-6,WHID 2001-6: XSS at Microsoft Passport,,"http://www.pcworld.com/news/article/0,aid,69543,00.asp",11/5/2001,Cross Site Scripting (XSS),Improper Output Handling,Disclosure Only,Service Providers,,No,,,,,,,,
-2002-1,WHID 2002-1: Flawed authentication at BN.com exposes personal information,"Opening an account with a discontinued e-mail address exposes all the information of the discontinues account
-2002-2,WHID 2002-2: Advogato XSS virus account,"
Additional information:
-2002-3,WHID 2002-3: Reuters accused of hacking,"A company put its earnings report on site before its official release, but did not linked to it. Reuters found the document and published it.
-2002-4,WHID 2002-4: Tower Records settles charges over hack attacks,"
View other customers orders by changing a guessable number within a URL parameter
-2003-1,WHID 2003-1: FTD.com hole leaks personal information,"
View other customers information by modifying a cookie
-2003-2,WHID 2003-2: UT Austin hack yields personal info on thousands,"
While an old incident, further research into it suggest that it was a web hack. While the initial reports talk about a database break in, a report in the Register identify the database as txClass, which is a web based system.
55,200 social security numbers where stolen, though the hacker claimed that he did not perform the act for profit. He was caught and sentenced to 5 years probation.
-2003-3,WHID 2003-3: User passwords could be stolid in Microsoft's Passport service,"
Additional information:
-2003-4,WHID 2003-4: SQL injection on Guess site triggers an FTC inquiry,"Additional information:
-2003-5,WHID 2003-5: Car shoppers' credit details exposed in bulk,"User submitted information was being stored in a publicly available location. The URL found in the source code of a publicly available web page.
-2003-6,WHID 2003-6: Mississippi man blackmails Best Buy,"
A person convicted of blackmailing Best Buy. He threatened to expose a breach in the company's web site if not paid $2.5 million.
-2003-7,WHID 2003-7: Victoria's Secret reveals far too much,"
View other customers orders by changing a sequential number within a URL parameter
-2003-8,WHID 2003-8: SQL Injection in PetCo.com leads to FTC investigation,"
Additional information:
-2003-9,WHID 2003-9: Defenses lacking at social network sites,"Additional information:
-2004-10,WHID 2004-10: SQL Injection and XSS on presidential campaign web sites,"On Sunday, security analyst Richard Smith did a quick check of the Bush and Kerry campaign sites and found several security problems on each, all of which are common on many other websites.",http://www.wired.com/techbiz/it/news/2004/06/64036,6/30/2004,SQL Injection,Improper Input Handling,Disclosure Only,Politics,,No,,,,,,,,
-2004-11,WHID 2004-11: Phishers Manipulate SunTrust Site to Steal Data,"Phishing based on XSS
-2004-12,WHID 2004-12: XSS in Gmail,"
An XSS was found in G-Mail
-2004-13,WHID 2004-13: SunTrust site XSS vulnerability exploited by for phishing,"
Phishing based on XSS (Same vulnerability but a different attack that the similar September 2004 attack)
-2004-14,WHID 2004-14: Santy worm defaces websites using PHP bug,"
Worm used Google to locate sites vulnerable to OS
-2004-15,WHID 2004-15: New Variant of Santy Worm Spreads,"phpBB worm
-2004-16,WHID 2004-16: Lycos Free Email XSS,"An XSS was found in Lycos Web Mail
-2004-17,WHID 2004-17: The CardSystems breach was an SQL Injection hack (Updated),"
Update (May 27th 2009) - The CardSystems incident is refusing to die. Merrick Back is now suing Savvis for certifying CardSystems as CISP compliant while it systems where wide open. CISP is a VISA program for certifying credit card processing systems which existed prior to PCI DSS.
-2004-18,WHID 2004-18: Security flaw exposed in Cahoot bank accounts,"Following a software upgrade, Cahoot, a UK based Internet only bank allowed accessing user accounts by guessing their user names. At least on one page allowed accessing an account by only specifying the user name in the URL. The bug was open for 12 days before being discovered.
-2004-1,"WHID 2004-1: Biggest Web Problem Isn't About Privacy, It's Sloppy Security - OpenTable","
Additional information:
-2004-2,"WHID 2004-2: Biggest Web Problem Isn't About Privacy, It's Sloppy Security - Saks","Additional information:
-2004-3,WHID 2004-3: More Scary Tales Involving Big Holes In Web-Site Security - Iomega,"Additional information:
-2004-4,WHID 2004-4: More Scary Tales Involving Big Holes In Web-Site Security - Kohl's,"Additional information:
-2004-5,WHID 2004-5: More Scary Tales Involving Big Holes In Web-Site Security - Gateway,"Additional information:
-2004-6,WHID 2004-6: More Scary Tales Involving Big Holes In Web-Site Security - Tiffany,"Additional information:
-2004-7,WHID 2004-7: More Scary Tales Involving Big Holes In Web-Site Security - University Sub Service,"Additional information:
-2004-8,WHID 2004-8: Broadcast TV announcements changed by hacking the stations web site,"Previously moderated weather announcements could be changed by the user
-2004-9,WHID 2004-9: Billing and personal information leakage due to lack of authentication on a phone company web site,"
A billing information system required only phone number and zip code to pull up account details
-2005-10,WHID 2005-10: Indian SATs results leaking,"
Additional information:
-2005-11,WHID 2005-11: Samy XSS Worm Hits MySpace,"The Samy worm at my space is now a classic, both a sophisticated attack and a well documented one, it became a case study in the web application security field. Recently Robert Hansen (RSnake) wrote a very interesting blog entry about Samy and what happened to him since.
-2005-12,WHID 2005-12: Insufficient authentication on Arbela mutual insurance allowed access to private data,"Extranet system accessible to the public
-2005-13,WHID 2005-13: Hacker attacked weak point on Kakaku.com's Web Site,"
Additional information:
-2005-14,WHID 2005-14: XSS on Microsoft Xbox site allowed phishing,"Additional information:
-2005-15,WHID 2005-15: Unprotected information on the University of Chicago web site,"Files containing sensitive information left unprotected on the web server
-2005-16,WHID 2005-16: MSN site hacked in South Korea,"
The web site was modified to include password stealing code
-2005-17,WHID 2005-17: Leakage of information due to XSS in Hotmail,"
Additional information:
-2005-18,WHID 2005-18: Hacker hits Duke system,"Additional information:
-2005-19,WHID 2005-19: Privacy Fears due to insufficient authentication on CVS drugstore chain web site,"Additional information:
-2005-1,WHID 2005-1: Gmail Bug Exposes E-mails messages of other users,"Parameter tampering enabled exposing sensitive information in G-Mail
-2005-20,WHID 2005-20: Security gaps found in EPA contracting system,"
An audit of a major Environmental Protection Agency contract management system uncovered significant security lapses that, if exploited by hackers, could have serious consequences for the agency's operations, assets and personnel. The audit focused on lack of monitoring for known vulnerabilities on these systems.
-2005-21,WHID 2005-21: Insufficient authentication on USC admissions site allowed access to applicants data,A person who discovered an SQL injection vulnerability in a USC system and informed security focus about the flaw was criminally charged with breaking into the system.,,4/20/2006,SQL Injection,Improper Input Handling,Disclosure Only,Education,,No,,,,,,,,
-2005-21,WHID 2005-21: Insufficient authentication on USC admissions site allowed access to applicants data,A person who discovered an SQL injection vulnerability in a USC system and informed security focus about the flaw was criminally charged with breaking into the system.,,4/20/2006,SQL Injection,Improper Input Handling,Disclosure Only,Education,,No,,,,,,,,
-2005-22,WHID 2005-22: MS UK defaced in hacking attack,"
Microsoft UK site defaced due to server misconfiguration
-2005-23,WHID 2005-23: Chinese hacker held in Web data theft,"
The hacker who penetrated Kakaku.com was arrested after breaking into Club Tourism International Inc. Hacking was done in order to earn money to pay for tuition.
-2005-24,WHID 2005-24: Firefox marketing site hacked,"
Additional information:
-2005-25,WHID 2005-25: No Charges Filed Yet Against South Charlotte Computer Hacker,"A man hacked into a competing web site
-2005-26,WHID 2005-26: NISCC reveals SAP R/3 security flaw,"
Additional information:
-2005-27,WHID 2005-27: Phishers hack eBay,"A bug in an eBay site allowed Phishers to redirect users to their own servers after feeling details at the genuine eBay site
-2005-28,WHID 2005-28: Phishers Steal Trust from eBay Sign In Pages,Phishers Steal Trust from eBay Sign In Pages,http://news.netcraft.com/archives/2005/07/29/phishers_steal_trust_from_ebay_sign_in_pages.html,9/6/2000,Redirection,Improper Input Handling,Phishing,Retail,"Campbell, CA",No,,,,,,,,
-2005-28,WHID 2005-28: Phishers Steal Trust from eBay Sign In Pages,Phishers Steal Trust from eBay Sign In Pages,http://news.netcraft.com/archives/2005/07/29/phishers_steal_trust_from_ebay_sign_in_pages.html,9/6/2000,Redirection,Improper Input Handling,Phishing,Retail,"Campbell, CA",No,,,,,,,,
-2005-29,WHID 2005-29: Security issues in interactive hotel TVs,"
While not strictly web security, this discussion of hotel rooms TV application security is a very good example of the dangers of our networked society
-2005-2,WHID 2005-2: Froogle XSS,"
An XSS was found in Froogle
-2005-30,WHID 2005-30: Blogger Developers Network Blog Cracked,"
Official answer from Blogger was that this was not the result of a hack attempt but of a subtle bug that occurred because our Developer's Network blog is a special case [it's got two names, 'code.blogger.com' and 'code.blogspot.com'].
-2005-31,WHID 2005-31: Hacker forced new planet discovery out of the closet,"
Additional information:
-2005-32,WHID 2005-32: Weak password recovery on Citrix's site,"Weak password recovery procedure at Citrix
-2005-33,WHID 2005-33: Insufficient authorization on Verizon's MyAccount feature,"
A web site flaw could have allowed a user to view another subscriber's balance of remaining airtime minutes and the number of minutes that customer had used in the current billing cycle
-2005-34,WHID 2005-34: Man logs into dabs.com misc customer account,"
Additional information:
-2005-35,WHID 2005-35: Stanford University web sites defaced using XMLRPC bug,"Sites where defaced by utilizing an issue in an XMLRPC library used by PHP
-2005-36,WHID 2005-36: Predictable delay in an online poker game enabled users to beat the casino,"
A player of an online game discovered that considerable delay hinted on the cards the dealer holds.
-2005-37,WHID 2005-37: A 12 years old hacked an online game and stole game items,"
A 12 years old guess login information of a woman and abused her account, stealing game items from her.
-2005-38,WHID 2005-38: Massachusetts Teen Convicted for Hacking into Internet and Telephone Service Providers,"
Teen convicted of threatening an ISP with DOS attack, among other computer hacking activities
-2005-39,WHID 2005-39: Promotional Firefox community site hacked (again),"
Exploited unpatched Twiki
-2005-3,WHID 2005-3: Misconfiguration issues in paid wireless access and billing applications,"
Multiple misconfiguration problems such as browsable directories, physical path revealing and default or weak passwords
-2005-40,WHID 2005-40: Defacement of several Novell websites,"
Script upload due to a scoop known vulnerability
-2005-41,WHID 2005-41: XSS on Google's AdWords enables phishing,"
Additional information:
-2005-42,WHID 2005-42: Default password in a common application used by schools,"The software has a default password for teachers, enabling anyone to access the system with teachers privileges.
-2005-43,WHID 2005-43: XSS in Yahoo's Web mail enables phishing,"
XSS in Yahoo mail, Allows phishing
-2005-44,WHID 2005-44: Xoops web site hacked,"
Configuration mistake left an unprotected unused virtual host. No details on the configuration problems given.
-2005-46,WHID 2005-46: Teen uses SQL injection to break to a security magazine web site,"
A high school student used SQL injection to break into the site of a Taiwanese information security magazine from the Tech Target group and steal customer's information.
-2005-47,WHID 2005-47: SEC Vs. The Estonian Spiders,"
Business wire allowed access to non published press releases.
-2005-48,WHID 2005-48: Insufficient authorization on Papa John's Pizza chain web site,"
Additional information:
-2005-49,WHID 2005-49: Google Base launched with security hole,"XSS in Google Base search function
-2005-4,WHID 2005-4: An Israeli debate site vulnerable to XSS,"
An Israeli public debates site called Hyde Park has an XSS vulnerability that exposes session cookies.
-2005-50,WHID 2005-50: XSS on Yahoo Mail,"
Inserting code in an HTML attachments enables changing the user interface of Yahoo mail, which may enable fraud.
-2005-51,WHID 2005-51: Critical MySpace Vulnerabilities Leave Every Active Account Exploitable,"
An XSS when receiving notification of an incoming IM message. Additionally it is possible to send an IM message to somebody who has blocked such messages by pretending to be answering a message from him.
-2005-53,WHID 2005-53: Charity Web Site Hacked,"
A UK Church charity web site was hacked and at least 3000 credit card numbers where stolen. Credit card information is known to have been used by the hackers. While no specific details are given, the article indicates that the way site was hacked.
-2005-54,WHID 2005-54: XSS vulnerability in NIST web site,"
Netcraft discovered an XSS vulnerability in NIST web site, which ironically hosts the U.S. National Vulnerability Database.
-2005-55,WHID 2005-55: Yahoo RSS XSS Vulnerability,"
A malicious site can offer users a malformed RSS XML file to be included Yahoo RSS aggregation that would enable stealing Yahoo cookies
-2005-56,WHID 2005-56: XSS vulnerabilities in Google.com,"
A redirection to an error page on Google.com includes values sent by the the user. This vulnerability allows phishers to send an e-mail with links to Google that will include their attack page.
-2005-57,WHID 2005-57: RPG site bit by hackers,"
User data stolen from an online game web site. The hacker tried to extort RPG by threatening to publish the users' data. The news item states that the hack was a result of a flaw in custom web site software.
-2005-58,WHID 2005-58: Yahoo mail Cross Site Scripting,"
An attacker can send an e-mail with a malicious script to a victim which is perform its actions immediately when the e-mail is read.
-2005-59,WHID 2005-59: Vote Someone Else's Shares,"
Janus mutual fund uses predictable identifier to authenticate its share holders enabling them to vote for others.
-2005-5,WHID 2005-5: Paris Hilton's T-Mobile online account hacked,"
Details remain sketchy, but news reports include social engineering, a guessable secret question for password recovery, and a known vulnerability is BEA WebLogic
-2005-60,WHID 2005-60: KU shuts down housing application Web site,"
Web site used to file online for housing at KU was shutdown for lack of proper security measures to prevent visitors from viewing personal information about others
-2005-61,WHID 2005-61: Gmail session management bug,"
A bug in Gmail's authentication and session management allows direct login to anybodies account without requiring any involvement of the victim.
-2005-62,WHID 2005-62: Guidance Software,"
3,800 customer credit-card numbers were stolen in the attack on Guidance Software web site. This incident is made more severe since Guidance software is a provider of software for investigating security breaches and many of its clients are security and law enforcement agencies, some of them known to be affected.
-2005-63,WHID 2005-63: Web designer sentenced for hacking competitor's site,"
While lacking in technical details, this story is certainly juicy. It demonstrates well the business use of web site hacking. The downside is that the hacker got only a minimal punishment, which unless the incident itself is overrated in the media, is a very bad sign on how courts view computer crime.
-2005-64,"WHID 2005-64: Woman scammed QVC for $400,000+ in Internet glitch","
A woman exploited a bug in QVC shopping network web site to get, without paying, more than 1800 items worth $412,000 items from the March to November 2005. The glitch enabled her to cancel orders she placed at a specific time and still get the product.
-2005-65,WHID 2005-65: LexisNexis Data Breach,"
The LexisNexis data breach is not new, but we have recently decided to start tracking abuse of insufficient automation measures and are adding historical incidents.
-2005-6,WHID 2005-6: Tampering with parameters allows access to others account data on PayMaxx Inc. site,"Parameter tampering enabled jumping into someone else's account data on PayMaxx Inc. site
-2005-7,WHID 2005-7: Hacker Tips Off B-School Applicants,"
Parameter tampering to jump into someone else's account data
-2005-8,WHID 2005-8: eBay Redirect Becomes Phishing Tool,"
Additional information:
-2005-9,WHID 2005-9: Undisclosed application security issue on Cisco's site forces global passwords reset,"An undisclosed application security issue on Cisco web site required resetting passwords for all registered users.
-2006-10,WHID 2006-10: NUJP website defacement seen not related to political crisis,"
A mass defacement of a Philippine hosting service was carried our using SQL injection. It accidentally also defaced the site of the National Union of Journalists of the Philippines, which led some to believe that it was a targeted political attack.
-2006-11,WHID 2006-11: Teenager claims to find code flaw in Gmail,"
A 14 years old claims to have discovered an XSS flaw in Google's Gmail. Comments have been mixed, and Google did not comment, so either the flaw was fixed pretty fast, or did not exits.
-2006-12,WHID 2006-12: Music Web Site: Breach Exposed Accounts,"
A musical instrument and sound gear Web site that advertises its relationship with artists such as Dave Matthews, Carlos Santana and Mary J. Blige was breached and notified some customers that their credit card information may have been stolen.
-2006-13,WHID 2006-13: Hackers Tap Banks' Web Sites In Unique Phishing Attack,"
In this very interesting attack a hacker broke into the informational web sites of several smaller banks in Florida. He than changed the link on the informational pages that points to the outsourced transactional web site to point to his own phishing site.
While the vulnerability that enabled the hacker to penetrate the informational sites is not known, this is a very interesting example of a targeted web attack. It highlights the importance of protecting every web site and not just the core business logic.
-2006-14,WHID 2006-14: Forgotten password clues create hacker risk,"
A UK Security Consulting firm reports that 54 UK sites that it has surveyed have flaws in the ""forgotten password"" feature.
-2006-15,WHID 2006-15: eBay contains a cross-site scripting vulnerability,"
eBay contains a cross-site scripting vulnerability. When an eBay user posts an auction, eBay allows SCRIPT tags to be included in the auction description which creates a cross-site scripting vulnerability in the eBay website
-2006-16,WHID 2006-16: AstraTel customer call records leaked,"
A security hole in Sydney internet provider Astratel's LiveBilling online account management system has seriously compromised its customers' privacy.
-2006-17,WHID 2006-17: Mass defacement using XSS at Israblog,"
Israblog is a large Israeli blogging site. A hacker used XSS to hijack bloggers sessions and deface them. The defacing was used to inform the world that Israblog lead developer is a bad programmer.
-2006-18,WHID 2006-18: Myspace.com - Intricate Script Injection Vulnerability,"
Forget putting <script> tags in input field. This high tech vulnerability exploits the code handling online/offline flags by inserting a malicious online/offline flag. Awesome.
-2006-19,WHID 2006-19: Google XSS,"
Yet another Google XSS. This time it seems to hit Arabic variant of the main search site. It seems that the actual language selector parameter enables the attack.
-2006-1,WHID 2006-1: Google's Blogger HRS vulnerability,"
Additional information:
-2006-20,WHID 2006-20: Sourceforge.net XSS (2),"Sourceforge forums search is vulnerable to XSS
-2006-21,WHID 2006-21: Sourceforge.net XSS (1),"
Sourceforge download pages are vulnerable to XSS
-2006-22,WHID 2006-22: SQL injection in a banking application,"
A CIO of a bank in Singapore reports that many application layer vulnerabilities, including SQL injection, where discovered in a banking application they purchased before it was put into production.
-2006-23,WHID 2006-23: ICQ search vulnerable to XSS,"
ICQ.com search script (search_result.php) is vulnerable to cross-site scripting attacks. This problem is due to a failure
in the application to properly sanitize user input, the input can be passed to the vulnerable script in 2 variables
(gender and home_country_code).
-2006-24,WHID 2006-24: Hotmail XSS (2),"
The $a variable in Hotmail's inbox is vulnerable to cross site scripting vulnerability. Exploit requires the victim to open the email message.
-2006-25,WHID 2006-25: Everyone.net XSS,"
Everyone.net login script (loginuser.pl) is prone to a cross site scripting attack in the variable loginName.
-2006-26,WHID 2006-26: Yahoo XSS used for phishing,"
An XSS vulnerability in Yahoo Mail is actively exploited for targeted phishing.
-2006-27,WHID 2006-27: SQL Injection in incredibleindia.org,"
www.incredibleindia.org is official Indian government tourism website.
The researcher has found that the parameter PageID in the page ms_Page.asp is vulnerable to SQL injection. He further tested that SQL error messages enable standard probing methods for finding out the number of columns and their type work.
-2006-28,WHID 2006-28: Tlen.PL e-mail XSS vulnerability,"
Tlen.PL is a popular Polish IM system provided by o2.pl, which includes e-mail accounts. The e-mail client is web based with a browser embedded in the communicator software. Certain webmail servers do not validate e-mail subject for HTML tags, allowing attacker to inject script code.
-2006-2,WHID 2006-2: GSA takes down eOffer after finding security flaw,"
Documents uploaded to GSA site where accessed using a predictable sequential identifier without requiring special permissions. The documents where available both for viewing and modifying. The site was in service for more than 18 months until the vulnerability was discovered.
-2006-30,WHID 2006-30: National Secret Agency of Slovak Republic Hacked,"
A hacker successfully abuse a vulnerability in Horde to penetrate a site owned by the National Security Agency of the Slovak Republic
-2006-31,WHID 2006-31: URL Bug On 1ASPHost and DomainDLX Hosting Services,"
A researcher found that the login error page on this sites can be injected.
-2006-32,WHID 2006-32: libero.it XSS vulnerability - HTML injection,"
Libero.it is a Web portal of big Italian ISP offering dial-up, Broadband and talk services. A script on it's customer service pages which enabled a connection speed test is vulnerable to XSS.
-2006-33,WHID 2006-33: Alexadex.com players.py XSS Exploit,"
Alexadex is an online investment game. There is an XSS vulnerability in the group adding functionality.
-2006-34,WHID 2006-34: XSS Exploit at sms.ac,"
This community site allows including scripts in multiple locations including ones personal profile thus enabling XSS.
-2006-35,WHID 2006-35: Yahoo mail XSS in CSS expression keyword,"
Yahoo mail does not filter properly the CSS ""expression"" keyword when it includes a comment that is encoded.
-2006-36,WHID 2006-36: PayPal Flaw Gets Accidental Two-Year Reprieve?,"
While XSS vulnerabilities in public web sites are found daily, this one is of special interest. It was found in one of the sites most targeted by Phishers, it is exploitable for Phishing and was exploited. On top of that, it seems to have been discovered and reported to PayPal already two years ago but ignored due to a communication failure.
-2006-37,WHID 2006-37: MySpace Hack Spreading,"
MySpace seems to be a heaven for XSS worms. This one seems to be even more interesting as it uses JavaScript embedded in a flash file. It is also interesting as it seems to combine the popular political defacement trend with high level application layer exploit.
-2006-38,WHID 2006-38: Convenience or just bad design?,"Altiris seems to have designed their servers so that it is easy to both access their customers upload as well as find out their e-mail addresses.
-2006-39,WHID 2006-39: Another Google XSS,"
An XSS vulnerability in the feature allowing adding an arbitrary RSS to personal web pages. Since this page resides on the main www.google.com host, the executed JavaScript can access any Google resource.
-2006-3,WHID 2006-3: Russian hackers broke into a RI GOV website,"
Russian hackers broke into a Rhode Island government Web site and allegedly stole credit card data from individuals who have done business online with state agencies. The hackers claimed to have stolen 53,000 credit card numbers, while the hosting service provider claims the number was just 4113.
The technical reference site is in Russian, you can use Applied Languages Solutions for an online translations.
-2006-40,WHID 2006-40: Data Mining MySpace Bulletins,"
MySpace bulletins, presumably accessible only to the social network of the originator can be access by anyone by iterating through a message id query parameter.
-2006-41,WHID 2006-41: Making money with MySpace bulletin system!,"
A bug in MySpace allowed a single click on an incoming bulletin by a person to forward it to all his contacts, making spreading a worm (or any content for that matter) too easy.
-2006-42,WHID 2006-42: Netscape.com hacked,"
Most XSS vulnerabilities are benign. In many cases they are hardly exploitable. In this case Netscape's new digg like shared news site was hacked using a persistent XSS attack, so every viewer of the site was attacked, luckily only to show funny dialog boxes.
-2006-45,WHID 2006-45: Man arrested for hacking Internet shopping malls,"
A Korean shopping system was vulnerable to hidden field manipulation and a determined hacker purchased $6000 worth of merchandize at 45 stores for much less.
-2006-46,WHID 2006-46: Hacker Redirects Bank Customers To Phony Site,"
A small credit union web site was hacked and the traffic redirected to a pharming site. About 180 users where redirected, out of which 12 where tricked into providing their personal information to the attackers. $500 are known to have been stolen from one of the victims.
-2006-47,WHID 2006-47: Santa brought to Zone-H a brand new defacement,"
Zone-h is one of the best (well, the best, not just one of them) web sites to follow if you interested in what the bad guys do. Their account of how their own web site was defaced is a classic. And no, it was not their fault. The incident shows how a seemingly minor vulnerability in a major web site (a hotmail XSS bug), can be used to deface another, unrelated site in a very elaborate and targeted attack.
-2006-48,WHID 2006-48: SQL Injection Used to Steal Information from "Life is Good","
Update (Jan 26th 2009) - an SC magazine article sheds more light on the incident revealing that there was actually a breach, apparently using SQL injection, which resulted in leakage of 10,000 credit card numbers
-2006-4,WHID 2006-4: Hacker diverts traffic from city's Web page,"A hoster was broken into by brute forcing passwords in a management interface. Sites of many clients, including three municipalities where defaced.
-2006-5,WHID 2006-5: Hotmail XSS (1),"
Hotmail's filtering engine insufficiently filters JavaScript scripts. It is possible to write JavaScript in the BGCOLOR attribute of the BODY tag, using CSS. This leads to execution when the email is viewed. JavaScript must be Unicode encoded in order to fool the filter. This encoding is recognized with IE >= 6
-2006-6,WHID 2006-6: Hacker breaks into Buffalo sports site,"
A site of a minor league baseball team was hacked and personal details of fans was stolen.
-2006-7,WHID 2006-7: Google Reader "preview" and "lens" script improper feed validation,"
Google reader allows redirection so sites can fool users to subscribe to malicious content.
-2006-8,WHID 2006-8: ICQmail.com - Mail2World.com XSS vulnerability,"
Links sent to a user as part of the mail content are not properly sanitized, so a user receiving such mail and activating a link would be affected.
-2006-9,WHID 2006-9: EBay XSS,"
Unlike other XSS cases, this was discovered due to actual abuse on a specific auction at EBay.
-2007-01,WHID 2007-01: Credit Card Information stolen from Indiana's Web Site,"
On January 3, a hacker broke into Indiana's government web site and made off with personal information for 71,000 health care aides who obtained certifications from the state, as well as 5,600 credit card numbers from people who had paid the state through the IN.gov web site.
-2007-03,WHID 2007-03: UI put staff data on Web,"Personal information for about 2,700 University of Idaho employees was inadvertently posted at the school's Web site for 19 days in February, though officials say it was not easy to access and there's no reason yet to believe it was misused.
-2007-04,WHID 2007-04: College glitch avails student information to public,"
A student at a community college in Sacramento who was "Googling" himself last month found his name, among 2000 others, in a file accidentally left by school staff online and picked by Google crawler.
-2007-05,WHID 2007-05: Hacking John McCain,"An open source developer virtually defaced John McCain's MySpace page. He did not have to commit any crime, because the page pulled an image directly from the open source developer's site.
-2007-06,WHID 2007-06: Hackers swipe seed company's customers' data,"
11,500 credit card numbers have been stolen from the web site of Johnny's Selected Seeds a small ($13M in revenue per annum) on line vendor of seeds in Main. 20 of these are known to have been abused. As usual, the hack was discovered because of fraudulent use of stolen credit cards rather than security measures used protect the web site.
-2007-07,"WHID 2007-07: Westerly Hospital data breach affects 2,000","
Personal information about 2,000 patients was mistakenly published on the hospital's web site. The leakage was discovered only when a patient found her information when ""Googling"" herself.
-2007-08,WHID 2007-08: WordPress Backdoor,"
Backdoor was planted in a new official release of WordPress, the most popular blogging software in the world. It was available for download for a few days before the backdoor was located.
-2007-09,WHID 2007-09: Former Fruit of the Loom workers' identities compromised,"
Names and social security numbers of former employees of Fruit of the Loom where available for download from the company's web site.
-2007-10,"WHID 2007-10: Super Bowl Site Hacked with Trojan, Key logger","
Hackers penetrated the Dolphins stadium web site just days before the Super Bowl was held there and modified the home page to include a Trojan inflecting script.
-2007-11,WHID 2007-11: Nokia defaced by XSS,"
Nokia's Canadian Web Site was defaced using an XSS attack.
-2007-12,WHID 2007-12: SQL injection at knorr.de login page,"While vulnerabilities in public web sites are dime a dozen this days and rarely included in WHID, a classic SQL injection in the login form on the home page of the web site of a very big company is worth an entry. In my presentation I usually claim that such vulnerabilities have disappeared years ago and then go on to show advanced SQL injection techniques. It seems that they exit.
-2007-13,WHID 2007-13: Hackers hit Georgia Tech and steal personal info,"
The personal information of about 3,000 current and former Georgia Tech employees may have been compromised. The informatoin included names, addresses, Social Security numbers and other sensitive information, including about 400 state purchasing card numbers.
-2007-14,WHID 2007-14: Your Free MacWorld Expo Platinum Pass,"A priority code, used to get free platinum pass to MacWorld Expo, was validated on the client and enabled anyone get the pass for free. While ""grutz"" informed the organizers about it, when going over their log files they found out that others abused the vulnerability without letting anyone know about it.
-2007-15,WHID 2007-15: High School Hackers Cancel School With Fake Snow Day,"
Two girls modified a schools home page by adding a note that school was closed due to a snow storm. The attack was probably done using a rouge admin accounts.
-2007-16,"WHID 2007-16: USDA admits data breach, thousands of social security numbers revealed","Details about 63,000 loans granted to farmers by USDA (The US department of agriculture) where posted online by mistake.
-2007-17,WHID 2007-17: Big Brother's big bother,"
The site of ""Big Brother"", a reality show in Australia issued duplicate session IDs to different users since the session ID pool was exhausted. Naturally, the 2nd person to get the same session ID got to see all the details of the 1st one!
-2007-18,WHID 2007-18: Microsoft.com defaced,"
This incredible story from our friends at Zone-H shed light on one of those defacement attacks, which usually go unexplained. This time an infamous Saudi-Arabian hacker abused SQL injection vulnerability in Internet Explorer Administration Kit web site. And guess what type of SQL injection: A login form SQL injection!
-2007-19,WHID 2007-19: Hacker accessed data at University of Missouri,"
A report within the help desk system used to track the status of open service calls created a file that was a accessible to everyone. A hacker abused the problem to get information regarding 22,000 current and former students.
-2007-20,WHID 2007-20: Pirate Bay breach leaks database,"
Private Bay is a BitTorrent information exchange blog site. Hackers used an SQL Injection vulnerability in the web site to steal 1.6 million users and passwords of the site. At least the passwords where hashed, which means that the hacker would need a cracking software and only the lame passwords will be found.
This incident highlights the Web authentication problem. Just think how many of those users use the same username and password in many other sites.
-2007-21,WHID 2007-21: Belgian Defense Ministry site defaced by Turks,"
The site of the Belgian Defense Ministry was defaced by Turks who protested a pro-Kurdish remarks by the Belgian government.
-2007-22,WHID 2007-22: Hacking of CM's website: Interpol's help sought,"
The web site of the chief minister of Kerala (an Indian State) was hacked and defaced. The local police has contacted the Interpol to help in finding who is behind the web site hacking.
-2007-23,WHID 2007-23: Office of Nation's Top Spy Inadvertently Reveals Key to Classified National Intel Budget,"A spreadsheet left on the web site of the US office of national intelligence includes secret information on the total budget of the US intelligence. Interestingly the not all the required information appears in the document, but combined with other pieces of information made available prior, the total number can be calculated.
-2007-24,WHID 2007-24: Hackers access personal info on faculty members at Univ. of Virginia,"
An undisclosed vulnerability in a web application at the University of Virginia allowed hackers to access names, social security numbers and birth dates of faculty members from May 2005 until April of 2007. Approximately 5700 records where stolen in 54 distinct break-ins.
-2007-25,WHID 2007-25: University of Iowa Molecular and Cellular Biology Program Security Incident,"
Approximately 1100 students and faculty members' personal information records which includes social security numbers were exposed by a vulnerable web application at the Molecular and Cellular Biology program at the University of Iowa. The report suggests that the application was actually compromised.
-2007-26,"WHID 2007-26: $1,000,000 CNBC stock trading contest hacked","The CNBC stock trading reality TV show was even more real than contenders thought it would be. It seems that players learned to cheat the game by opening a browser form to by a stock before closing and issuing the transaction, at the set price, only after closing, when more information is already available.
-2007-27,WHID 2007-27: Files From Google On the Streets,"
Google left some files at the wrong place at the wrong time. These files includes, surprisingly, database connection strings, including a user name and a password. Hardly news, but this time it is Google.
-2007-28,WHID 2007-28: US Embassy probes hacking of online visa appointment system,"
If you live in a country from which you need a Visa to get to the states, you knew this would happen. The US online Visa appointment system is very open. Indeed too open. Someone in Jamaica took advantage of this to pre-allocate appointments.
-2007-29,WHID 2007-29: Teen arrested for hacking Belgian police website,"
As you may know, defacement usually do not find their way to WHID, especially if the method used is not known. However, since in this case the victim was the Belgian police, I though it is worth including.
-2007-30,WHID 2007-30: Microsoft UK site defaced,"
Yet another defacement, but with a very high profile target, and a detailed description of the attack which took advantage of an SQL injection vulnerability. The report even includes a video recording of the attack.
-2007-31,WHID 2007-31: Hackers Make Off With Personal Info On Applicants At UC Davis,"
Somebody snitched names, social security number and birth dates of approximately 1500 students at the vet school of UC Davis. Indication is that the web application used by the students was as fault. The school's web site described the incident as a result of ""the computer attacker being able to manipulate a university computing application to accept unauthorized commands"". A disgruntled cow?
-2007-32,WHID 2007-32: XSS vulnerability on various German online banking sites,"
I seldom add disclosures anymore to WHID, even less XSS disclosures, but since this time they were discovered in banking sites, I thought it was worth it. After all, too many times people think that application vulnerabilities are found only at less ""serious"" or less ""important"" web sites where no real damage can occur.
-2007-33,WHID 2007-33: THAILAND: ICT Ministry website sabotaged by hacker,"
While defacements are usually not the bread and butter of this database, when it hits an important government site, especially of a ministry in charge of information technology, it is worth mentioning it.
-2007-34,WHID 2007-34: Fox News leaks secret files,"
Fox News left non public files on a directory accessible to everyone on their web server.
-2007-35,"WHID 2007-35: Data lapse involved 51,000 at a hospital","
In a classic case of lack of proper separation between the production and development sites, an application under production with lack of proper authentication and authorization was installed on a hospital's public web site, enabling anyone to query a database of 51,000 names, addresses and social security numbers.
-2007-36,WHID 2007-36: Server hacked through holes in Confixx management software,"
A command injection vulnerability at 1&1, a large German hosting provider, lead to denial of service and possible home page modification at 30 servers and up to 1700 web sites.
-2007-37,WHID 2007-37: United Nations VS SQL Injections,"Defacements are usually beyond the scope of the Web Hacking Incidents Database. We only publish those that stand out, and this one certainly stands out.
-2007-38,WHID 2007-38: Gentoo takes server offline due to security vulnerabilities,"This gem is very interesting since it happened on Gentoo servers. It therefore combines transparency into the incident that only an open source project can offer with the importance and resource of a large one. As a result we have a detailed report about the vulnerability, exploit attempts and event people shouting at each other during the patching process.
What can we learn from this? That no server is secure, and that patching is hard.
-2007-39,WHID 2007-39: Hacker sabotages Peru president's Web site,"
Defacements seem to start dominating this list. Alas, they are the most obvious web site hacks out there. While not every defacement is reported in the Web Hacking Incidents Database, key ones are. I included this one since the attacked web site is significant, and since it emphasizes what is becoming a major goal of attacking: politics and international affairs.
As a side note, this incident is also interesting because it was repeated after discovered and presumably fixed, which goes a long way to show how much effort there is in protecting web sites and how difficult it cab be.
-2007-40,WHID 2007-40: County's Web site hacked; no data lost,"
Defacements seem to dominate the list recently, probably because they reach everywhere. Two important conclusions from this particular one are that patch management is a key problem and that it is a problem mainly at government sites across the world.
-2007-41,WHID 2007-41: Hackers hit New Zealand Herald website,"
Still defacement but this time with a twist. This was a genuine XSS rewriting attack, and was carried out by well known people as a stunt. No information is provided on how the XSS vector found its way to the victim computers.
-2007-42,WHID 2007-42: Bank of India seriously compromised,"
This very serious hacking incident provides insight into a lot
of the failures information security in general and web application
security particularly beyond the simple fact that the web site of the
largest state owned bank in India was invisibly defaced with Trojan
inflicting code.
-2007-43,WHID 2007-43: Hacker attacks the Ministry for Housing website as Spanish mortgages come under the international spotlight,"Yet another defacement, and as usual in the political arena.
However, this one is worth a note as the attack is very targeted, while
usually such political defacements are carried quote randomly against
sites loosely related to the opponent and usually has little to do with
the actual message the attackers want to convey. In this case the
defacement seems to be a direct response to the hot debate about
housing prices in Spain.
-2007-44,"WHID 2007-44: Hacker Breaks Into eBay Server, Locks Users Out","A hacker exploited a leftover admin function on eBay to block users and close sales.
-2007-45,WHID 2007-45: XSS flaw makes PM say: "I want to suck your blood","
Using XSS on the sites of both Australian major political parties a security researcher nicknamed Bsoric caused the Liberal Party's Web site to read: ""John Howard says: I want to suck your blood"", while another script caused a window to pop up on the Labor Party's Web site, urging viewers to ""Vote Liberal!""
-2007-46,"WHID 2007-46: School Web site breached? Personal info of Pembroke workers, volunteers accessible for months","
Personal information on anyone who worked or volunteered for the Pembroke schools in the last four years was accessible via the Internet because of a weakness in the district's computer system. The information, including names, birth dates and Social Security numbers, was available from May until Oct. 2, when school officials learned of the problem.
-2007-47,"WHID 2007-47: Commerce Bank, a US regional bank, hacked","
3,000 records were exposed and 20 actually stolen at Commerce Bank, a small bank in Central USA. While the vulnerability exploited is not clear, SQL injection was mentioned. Therefore the record is uncertain and based on further information, it might be withdrawn.
-2007-48,WHID 2007-48: MSU investigating hacking incident,"
Information including birth date and social security number of 1400 students who enrolled online to the Montana State University has been stolen by hackers. While no technical explanation is provided, the fact that only students who enrolled online where affected points to a web site breach.
-2007-49,WHID 2007-49: Hackers Block Sale of Colorado Rockies World Series Tickets,"
The site of the Rockies was taken down by a denial of service preventing fans from buying tickets for the World Series games.
-2007-50,"WHID 2007-50: Art.com says hacker accessed names, credit cards","
A hacker gained access to names and encrypted credit card numbers of Arts.com. While the reason is not known, since the information is known to belong to online shoppers who made transactions from July to September we assume it was a web site breach.
-2007-51,WHID 2007-51: 570 Scarborough & Tweed customers' personal information accessed by SQL injection,"
The web servers of Scarborough & Tweed, a company that does business online selling corporate gifts online, were compromised and information about 570 customers may have been accessed using an SQL injection attack. The information includes customers' names, addresses, telephone numbers, account numbers, and credit card numbers.
-2007-52,WHID 2007-52: Hacker halts Rivkin auction of 37 watches,"
Seems that the there is a new trend to disrupt on line bidding using denial of service attacks. In this case, an auction for 37 very expensive watches was halted 20 minutes before the end as the site crashed, in what official sources describe as a hacker attack that did not result in a site compromise.
-2007-53,WHID 2007-53: Google's Advanced Search Operators Abused by Spammers,"
While most WHID entries are about web site breaches, sometimes vulnerability in a web application is used indirectly. Redirection functions in web applications are commonly used by spammers and phishers. It allows them to include a honest looking URL in their e-mail, this way bypassing spam filters and observant users.
-2007-54,WHID 2007-54: Mistake Left Constables Open To ID theft,"An Excel spreadsheet was published on containing sensitive information regarding police officers in York, England. The information included Social Security numbers of 46 offices and the home addresses of 74 offices. As a result identities of 3 offices where stolen.
-2007-55,WHID 2007-55: Malicious Code Infects Chinese Security Site,"Defacement are a dime a dozen this days, and are not normally reported by WHID. Even invisible defacements in which sites are changed in order to infect their clients with malicious code are becoming too common. But this time it is the site of a security organization, and not just any one, but China's internet security organization. So in the light of the hot debate about china as the source of all hacking, we think that this story has a value.
-2007-56,WHID 2007-56: TJMaxx XSS Vulnerability,"
A small XSS vulnerably caught RSnake eyes. What makes it different, after all xssed.com lists thousands and thousands of those? What caught RSnames eyes was the vulnerable site. TJMaxx earned the reputation as the company that suffered the biggest security breach ever. You would expect them to be more careful.
-2007-57,WHID 2007-57: New Zealand's Government Web Sites Attacked And Information Stolen,"
An attack on New Zealand government web sites required New Zealand Prime Minister, Helen Clark to comment and ensure the public that no confidential information was stolen. However official sources in New Zealand confirm attacks were carried out by unnamed, but known, foreign governments on New Zealand government web site that resulted in stealing of information.
-2007-58,WHID 2007-58: Internet Retailer Publisher Victim of Customer File Hack,"
Vertical Web Media, publisher of Internet Retailer magazine, suffered a security http://www.theregister.co.uk/2007/08/17/gentoo_disconnects_vulnerable_se... and credit card information of readers had been stolen. The Irony is that Internet Retailed magazine is covering the risks of e-commerce.
-2007-59,"WHID 2007-59: Hackers jack Monster.com, infect job hunters","A Crimeware iframe tag on a site is not news anymore. On Monster.com it is.
-2007-60,WHID 2007-60: The blog of a Cambridge University security team hacked,"
This story probably represents hundreds of similar stories. Many of us have come to rely on open source software, which is useful, feature reach and free. It enables us access to tools available to a few only a couple of years ago. The downside is that this easy availability means that many use the tools without having the time, resources and expertise to protect them. Systems such as phpBB and WordPress are good
examples of very popular open source systems that require constant
attention in order to maintain secure.
-2007-61,WHID 2007-61: Another inconvenient truth: Al Gore's Web site hacked,"Whether comment spam by itself is an application failure or a necessary evil for site allowing rich comments is an open question. However it is reported that in this case vulnerability in WordPress allowed the spammers to actually penetrate the site and modify pages and not just abuse comments.
-2007-62,WHID 2007-62: A security flaw in Passport Canada's website,"
The Web site of the Canadian passports authority enables users to access others' record by modifying a value of a parameter in the URI.
-2007-63,"WHID 2007-63: Credit card data theft at Kartenhaus, a Ticketmaster German subsidiary","
An unidentified group had stolen credit card numbers and billing addresses of the Hamburg, Germany ticket sales office Kartenhaus, a subsidiary of Ticketmaster. Some 66,000 customers who purchased tickets with a credit card from the Kartenhaus.de web site between October 24, 2006 and September 30, 2007 were affected.
-2007-64,WHID 2007-64: Information about Duke's Students and Applicants Stolen,"
The personal data of nearly 1,400 prospective Duke Law School students may have been stolen by a hacker from two separate databases, one including the prospective students' data and another filled with requests for information about the school.
-2007-65,WHID 2007-65: Facebook suing a porn site over automated access,"
Use of robots and automated software against a web site, as long as it is not done in order to break into the site, falls into a grey area. While hard to classify as an unlawful act, it is usually harmful to the site owner and possibly to the site users. Apart from using valuable resources, such an automated access may breach the site's usage license of public information and might also indicate unlawful activity such as using a botnet. Many times it is hard to know if such a blast of requests is a denial of service attack, brute force password cracking or just a search engine crawler.
-2007-66,WHID 2007-66: Hacker Conquer French Embassy In Libya Web Site,"To iframe or not to iframe, this is the question. As malware becomes more popular, the number of incidents, mostly insignificant, in which malware was planted on a hacked site is rising and WHID is not the right place to list all of them. We currently report such incidents if the hacked site is of interest or if the Attack_Method is known.
-2007-67,WHID 2007-67: The Day My Web Site Was Hacked,"
In an incident very similar to the Al Gore Hack, the personal blog of IT journalist Tim Anderson was also hacked. Unlike Mr. Gore, Tim discusses the breach and its origins.
-2007-69,WHID 2007-69: The Orkut XSS Worm,"
A vulnerability in the social networking site Orkut that allowed users to inject HTML and JavaScript into their profiles set the stage for a persistent XSS worm that appears to have affected more than 650,000 Orkut users.
-2007-70,"WHID 2007-70: Tucson, Arizona police web site defaced using SQL injection","Just like WHID 2007-60, this hack is probably a representative of many other incidents. The Indonesian hacker Hmei7 has left the message ""Hmei7 has touched your soul"" on the Web site of the police department in Tucson, Arizona. Only unlike regular defacement, this time it is not the front page but rather the news section that was modified.
-2007-71,WHID 2007-71: Hacker uses Social Security numbers from Ohio court site,"The Secret Service has arrested at least 6 people in an investigation that involves information theft at an Ohio court web site, which is actively used for identity theft. At least one known identity theft case resulted in $40,000 loss to the victim.
-2007-72,WHID 2007-72: David Airey domains hijacked,"Update (Dec 30th 2008)
-2007-73,"WHID 2007-73: Brokerage Firm Fined $375,000 for Unsecured Data","Brokerage firm DA Davidson has agreed to pay a fine of $375,000 for failing to protect confidential client data from Latvian hackers who breached the company in 2007 in an online extortion scheme.
-2007-74,"WHID 2007-74: Web host breach may have exposed passwords for 6,000 clients","A known vulnerability in the helpdesk software used by hosting provider Layered Technologies resulted in leakage of information, including names, addresses, phone numbers and email addresses of up to 6,000 of the company's clients.
-2007-75,WHID 2007-75: PlusNet blames itself for webmail spamfest,"
Misconfiguration of a webmail system at a British hosting provider led to leakage of the entire user's database including all e-mails. The e-mail addresses where actively used for sending spam. Additionally the exploit was used to plant malware on some of the customers' web sites.
-2007-76,WHID 2007-76: A large web hosting firm inflicted by mass malware installation,"The Washington Post ran a story about a large scale infiltration to IPower, a major hosting provider. According to the story and the following comments, it seems that the problem is plunging IPower for a long time without being resolved. Put in perspective the PlusNet incident which was serious but swiftly handled and publicly acknowledged by the company.
-2007-77,WHID 2007-77: HostGator: cPanel Security Hole Exploited in Mass Hack,"Hackers exploited an unknown cPanel vulnerability to break into HostGator servers and plant malware on hosted sites.
-2007-78,WHID 2007-78: A Brazilian banking site allows users to views receipts intended for others,"
IDG now reports a bug in the internet banking application of Unibanco, a Brazilian Bank. The vulnerability allowed logged users to view transaction receipts of other unrelated users by changing the ""receipt ID"" on the form or URL.
-2007-79,WHID 2007-79: Infamous Russian malware gang used SQL injection to penetrate US government sites,"RBN was a big story. It was a hackers group that could work relatively freely in Russia due to rumors connections in high windows. This way it could allow safe hosting for malware. For getting people to the malware they penetrated web sites around the world, and the references article mentioned SQL injection as the method they infiltrated more high profile sites such as US government sites.
-2007-80,WHID 2007-80: Vodafone blocks website after hacking,"
Yet another defacement, but this time at a very major telecommunication provider in India. These are the guys in charge of our network after all!
-2007-81,WHID 2007-81: MSNBC Turkish site caught serving malware,"
Another Malware defacement, but this time at a very prominent web site: MSNBC Turkish edition. There are indications that this is an application layer attack.
-2007-82,WHID 2007-82: An SQL injection Mass Robot,"
An SQL injection robot is running wild and has already hacked hundreds of thousands of web sites. Since the robot plants malicious code in infected sites, its traces can be found by Googling for a name of Chinese sites referred to in malicious code.
-2007-83,WHID 2007-83: More Social Security numbers leaked at Montana State University,"Again a Microsoft Excel file was left on a University's web site for anyone to view.
-2007-84,WHID 2007-84: Soccer league's online shoppers get kicked by security breach,"It is already February, and we still add 2007 incidents. If
you wonder why, it is because organizations such as MLS only now find
out that they were hacked last year! Sometime between January and
August of 2007, names, addresses, credit and debit card data, and
passwords of an unknown number of people, including 169 New Hampshire
residents were stolen from the site.
-2007-85,WHID 2007-85: IndiaTimes.com Visitors Risk High Exposure To Malware,"The web site of a leading Indian newspaper is swamped with malware. A recent survey by WebSense cites by the Register found that of the sites hosing malware, 51% where legitimate sites that have been broken into. This is a major shift in the threat landscape, since keeping to web sites that you know is no longer a good protection strategy. Anecdotally undermining WebSense own web site classification technology as a security solution.
-2007-86,WHID 2007-86: Mac Blogs defaced using XSS,"
The standard disclaimer that we do not cover each and every defacement is relevant to this entry as well. So why do we include the defacement incident this time? First and foremost, it is known to be an XSS abusing a WordPress zero day bug. Secondly, it is a targeted attack aiming to deface only Mac related web sites. Usually targeted defacement attacks are carried out against political targets. Did attacking apple become a political issue? Was Apple transformed into a nation overnight? Well certainly into a cult.
-2007-87,WHID 2007-87: Hacker uses Insider information to gain on the stock exhange,"###
-2007-88,WHID 2007-88: Police Academy in India Hosting a Phishing Site,"
The SVP National Police Academy in Hyderabad, India has had some sort of compromise on their website resulting in a Bank of America phishing site operating on one of their servers.
",,9/20/2008,Unknown,Unknown,Phishing,Government,India,No,,,,,,,,
-2007-88,WHID 2007-88: Police Academy in India Hosting a Phishing Site,"The SVP National Police Academy in Hyderabad, India has had some sort of compromise on their website resulting in a Bank of America phishing site operating on one of their servers.
",,9/20/2008,Unknown,Unknown,Phishing,Government,India,No,,,,,,,,
-2007-89,WHID 2007-89: The big TJX hack,"Update (January 12th 2009) An Ukrainian hacker who who was a member of the TJX hack ring was sentenced to 30 years in jail by a Turkish court. According to investigation papers Maksym Yastremskiy made approximately 11 million dollars from the hack!
-2008-01,WHID 2008-01: Information stolen from geeks.com (Updated),"Update (Feb 8th 2009) - The company has reached a settlement with the FTC. Not a breathtaking achievement in the effort to make business care about web application security, yet a step in this direction. The report also identifies the attack as an SQL injection attack.
-2008-02,WHID 2008-02: Italian Bank's XSS Opportunity Seized by Fraudsters,"It has been a while since a phishing scam using XSS vulnerability found its way to the Web Hacking Incidents database (SunTrust, WHID 2004-11). The current incident is a good example of what does and does not get into our database: XSS vulnerabilities in public web sites are discovered daily and reported in sites such as XSSed, however most of these vulnerabilities are not included in WHID for lack of public interest. The current incident is different since the vulnerability is known to be exploited by attackers, moving it from the realm of technical interest to the realm of a real problem.
-2008-04,WHID 2008-04: RIAA web site cleared,"The web site of RIAA, the Recording Industry Association of America was attacked twice using SQL injection over the weekend. First a query that takes particularly long time was posted on a social network web site causing a distributed denial of service attack against the site. Later on hackers found and abused additional SQL injection and XSS vulnerabilities resulting in major defacement of the site.
-2008-05,WHID 2008-05: Drive-by Pharming in the Wild,"Symantec reported an active exploit of CSRF against residential ADSL routers in Mexico (WHID 2008-05). An e-mail with a malicious IMG tag was sent to victims. By accessing the image in the mail, the user initiated a router command to changethe DNS entry of a leading Mexican bank, making any subsequent access by a user to the bank go through the attacker's server.
-2008-06,WHID 2008-06: Hackers Take Down Pennsylvania Government,">
-2008-07,WHID 2008-07: Another Free MacWorld Platinum Pass? Yes in 2008!,"
Kurt already got his free MacWorld pass last year (WHID 2007-14), but it seems that nothing changes year after year and he was able to pull a similar trick this year. As the codes that allow customers to get the passes where hashed but stored on the client browser, Kurt was able to crack them.
-2008-08,WHID 2008-08: Hacker steals Davidson Cos. clients' data,"A computer hacker broke into the database of D.A. Davidson, a local Montana financial services firm and stole their entire customers' database: 226,000 records including names and social security numbers. Attack_Method is not known, but it seems very much like a web hack.
-2008-09,WHID 2008-09: Hacking Stage 6,"Sensitive information about people who created an account on the site leaked and was published through IRC.
-2008-10,WHID 2008-10: Chinese hacker steals user information on 18 Million online shoppers at Auction.co.kr,"
Update (January 5th 2009)
-2008-11,WHID 2008-11: Hacker breaks into Ecuador's presidential website,"Was it defaced or not? In this extraordinary incident, a hacker broke to the web site of the Ecuadorian president and said nice things about him. So nice in fact that the presidential office had to apologize in front of the opposition leader. Was it a hack or an over enthusiastic marketing person?
-2008-12,WHID 2008-12: Greek ministry websites hit by hacker intrusion,"
This is yet another case of defacement of a governmental web site. It is amazing to note it is nearly never the large commercial and financial web sites that are defaced. It is either small mom and dad shops or government and political web sites. Don't you get the feeling the government IT is run like a mom and dad shop? Do you wonder if it is only the IT part that is run that way?
-2008-13,WHID 2008-13: Harvard site hacked and leaked on BitTorrent,"
Additional information:
-2008-14,WHID 2008-14: Hacker takes over Dallas police Web site,"### Dallas say the department shut down its Internet presence after a hacker took over its Web site and filled it with anti-American rants.
The vandalized Web pages included a doctored photograph showing American troops watching over four people lined up against a wall.
Each of the four prisoners had lines leading away from their faces to individual head shots of President George W. Bush, Vice President Dick Cheney, Secretary of State Condoleezza Rice and Sen. John McCain
-2008-14,WHID 2009-14: My.BarackObama.com Infects Visitors With Trojan,"
Websense reports that my.barackobama.com, an open blogging service which is part of Obama's campaign web site has been used to point users to malware infecting content.
-2008-15,WHID 2008-15: ValueClick to Pay $2.9 Million to Settle FTC Charges,"In this case SQL injection was not the root cause, but rather the justification. Just as Al Capone was arrested at the end of the day for tax evasion, ValueClick, which seems to infuriate the FTC over many nasty commercial misdeeds, was caught at the end of the day for SQL injection, presumably left open against the company written security policy.
-2008-16,WHID 2008-16: Turkish PM supporters hack hacker's Web site,"In a twist on the classical defacement incident, supporters of the Turkish PM defaced, as a retaliation, the web site of hackers who just recently defaced the PM web site. A disturbing question is whether this is a juvenile mischief or was the act planned and executed by PM supporters. Did the political spin reached web site hacking?
-2008-17,"WHID 2008-17: Hackers' posts on epilepsy forum cause migraines, seizures","Up to now we never registered at WHID an incident that caused physical pain on its victims. Unfortunately, there is always a first. In an attack which gives a whole new dimension to the term ""malicious"",hackers recently injected to the Epilepsy Foundation's Web site hundreds of pictures and links to pages with rapidly flashing images.
-2008-18,WHID 2008-18: Winzipices SQL bot,"Another member of the wave of SQL injection bots injecting malware inflicting code to web sites.
-2008-19,WHID 2008-19: OSU breach raises fears of ID theft,"
At the Oklahoma State Universitiy (OSU) a security breach has exposed the names, addresses and Social Security numbers of 70,000 students, faculty and staff who bought parking and transit services permits in the past six years. The university failed to report the incident to affected individuals for two months after it was detected.
-2008-19,"WHID 2009-19: Kaspersky site breached using SQL injection, sensitive data exposed (Updated)","
Update (Feb 22nd 2009) - We were probably not the only ones not satisfied with Kasperski official press release on the subject. An interesting report on Kasperski viruslist blog by a person on the investigating team provides answers: the data was neither secured well nor the hacker incapable. The hacker made a mistake in his attack vector and decided to pursue no further. The data was available for any hacker who was really after it.
-2008-20,WHID 2008-20: XSS Worm At Justin.tv Affects 2525 Profiles,"A proof of concept XSS worm crawled justin.tv, a popular lifecasting platform. The warm succeeded in planting a self replicating code on 2525 accounts in less than 24 hours before the vulnerability was fixed.
-2008-21,WHID 2008-21: Information about organ and tissue donors open to all,"The Agency for Health Care Administration (AHCA) Florida's database of organ and tissue donor registry was open to the public due to an unspecified software glitch. Personal details of 55,000 people, including name, address, date of birth, driver license number and social security number where exposed.
-2008-22,WHID 2008-22: Hacker changes news releases on sheriff's Web site," A targeted defacement that modified two specific press releases to ridicule the local government.
-2008-23,WHID 2008-23: Sony PlayStation,"
Yet another iframe injection in a very prominent web site, proving yet again that nobody is immune.
-2008-24,WHID 2008-24: SQL attacks lob onto ATP Web site,"
Not a day goes by without yet another prominenent web site hacked by an SQL injection attack planting Malware.
-2008-25,WHID 2008-25: BusinessWeek website attacked and hosts malware,"
Another site hit by the SQL injection bot
-2008-26,"WHID 2008-26: Palin's private e-mail hacked, posted to Net","
The activist group called ""anonymous,"" best known for its jousts with the Church of Scientology, has apparently hacked into the private Yahoo e-mail account of Alaska Gov. Sarah Palin, the Republican candidate for vice president.
-2008-27,WHID 2008-27: U.K's Crime Reduction Portal Hosting Phishing Pages,"Poste Italiane seems to have relocated to a brand new location online, in this case the U.K's Crime Reduction Portal which is currently hosting a phishing page.
-2008-28,WHID 2008-28: Confidential data on thousands of students exposed by test preparatory firm,"While moving to a new hosting provider, a system by Princeton Review used by student to prepare for a state assessment program exposed due to misconfiguration approximately 34,000 students from 2nd to 10th grade. The information included names, Florida ID (which is nearly identical to the US social security number) and the students exam report.
-2008-29,WHID 2008-29: Sunwear hacks metasploit.com?,"
someone hacked a machine on the same subnet and was ARP spoofing the gateway. The metasploit.com machines were not compromised, but all HTTP requests coming into the ISP network were passed through a MITM defacer that inserted that HTML. Once I as able to set a static ARP entry and notify the ISP, the problem was resolved. So, to make things clear, the metasploit.com servers were not hacked, the ISP
",,9/20/2008,ARP spoofing,Insufficient Transport Layer Protection,Defacement,Internet,,No,,,,,,,,
-2008-29,WHID 2008-29: Sunwear hacks metasploit.com?,"someone hacked a machine on the same subnet and was ARP spoofing the gateway. The metasploit.com machines were not compromised, but all HTTP requests coming into the ISP network were passed through a MITM defacer that inserted that HTML. Once I as able to set a static ARP entry and notify the ISP, the problem was resolved. So, to make things clear, the metasploit.com servers were not hacked, the ISP
",,9/20/2008,ARP spoofing,Insufficient Transport Layer Protection,Defacement,Internet,,No,,,,,,,,
-2008-30,"WHID 2008-30: Security breach hits DivShare, unauthorized access to its database","The popular document and media sharing service DivShare, suffered a security breach that allowed a malicious user to access their database, which included user e-mail addresses and other basic profile information.
-2008-31,"WHID 2008-31: Hacker takes $50,000 a few cents at a time","
Californian Michael Largent used an automated script to open 58,000 such accounts, collecting many thousands of the small payments used to verify credit cards when openning accounts.
-2008-32,WHID 2008-32: Yahoo HotJobs XSS,"
Netcraft reported an ongoing exploit of XSS vulnerability in Yahoo HotJobs site. The attackers have been using an obfuscated JavaScript to steal session cookies of victims, which were in turn sent to a server in the US.
-2008-33,WHID 2008-33: Chinese hacker jailed for false quake alarm,"
A Chinese student penetrated the Shaanxi Provincial Seismic Bureau's web site and planted a false warning on an earth quake expected the following night reports The Australian.
-2008-34,WHID 2008-34: Adobe hit by malware,"
Adobe joins the long list of sites hit by Asprox, a botnet using SQL injection attacks to plant malware. Internet News reports that Sophos has discovered malwares on Adobe ??Vlog it?? and ??Serious Magic?? sites.
",,10/17/2008,SQL Injection,Improper Input Handling,Planting of Malware,Technology,USA,No,,,,,,,,
-2008-34,WHID 2008-34: Adobe hit by malware,"Adobe joins the long list of sites hit by Asprox, a botnet using SQL injection attacks to plant malware. Internet News reports that Sophos has discovered malwares on Adobe ??Vlog it?? and ??Serious Magic?? sites.
",,10/17/2008,SQL Injection,Improper Input Handling,Planting of Malware,Technology,USA,No,,,,,,,,
-2008-35,WHID 2008-35: Business Week site hit by malware,"Business Week is the latest victim of Asprox, a botnet using SQL injection attacks to plant malware. Internet News reports that Sophos has discovered malwares on a large number of pages on the magazine??s web site. A Google safe browsing report, which checks how many pages on a web site, if any, are infected with malware picked at 214 out of 2,157 pages on the site, just shy of 10%.
",,9/15/2008,SQL Injection,Improper Input Handling,Planting of Malware,Information Services,USA,No,,,,,,,,
-2008-35,WHID 2008-35: Business Week site hit by malware,"Business Week is the latest victim of Asprox, a botnet using SQL injection attacks to plant malware. Internet News reports that Sophos has discovered malwares on a large number of pages on the magazine??s web site. A Google safe browsing report, which checks how many pages on a web site, if any, are infected with malware picked at 214 out of 2,157 pages on the site, just shy of 10%.
",,9/15/2008,SQL Injection,Improper Input Handling,Planting of Malware,Information Services,USA,No,,,,,,,,
-2008-36,WHID 2008-36: RBS WorldPay Data Breach Hits 1.5 Million (Updated),"Update (Feb 4th 2009): While RBS reported that just 100 cards where abused in the incident, the news now surfaced, that those cards where heavily abused as the hacker managed to lift the withdrawal limit and distribute the card copies around the world so that in total 9 million dollars where withdrawn from them in a matter of hours before they where blocked. At least, as the saying goes, losing a $100 is your problem; losing a million is the banks.
-2008-37,"WHID 2008-37: Pakistani hacker attacks Indian Rail site, threatens cyber war on India","The web site of the Indian Eastern Railway company was hacked. The hacker planted malware on the site and added a message to the home page declaring a cyber war on Indian Cyberspace.
-2008-38,WHID 2008-38: DNSChanger Trojans v4.0,"The DNSchanger Trojan uses different methods to manipulate the DNS lookup of the victim. One of the most malicious techniques is using CSRF to attack the ADSL or cable router and modify its DNS tables.
-2008-39,WHID 2008-39: Hacker compromises a south african political party web site,"The South African Democratic Alliance party's web site seems like another random victim of the Asprox family of bots. This specific incident demonstrates several issues:
-2008-40,WHID 2008-40: Olympics news sites hit with attacks,"Like many Asprox bot SQL injection attacks, the one on NDTV.com, a New Delhi TV station's web site has its unique aspects.
-2008-41,WHID 2008-41: A Joomla first day exploit,"Joomla is a widely used open source content management system. Many administrators reports that a vulnerability announced August 12th was immediately exploited by hackers to attack Joomla based web sites. Another report shows a specific site that was defaced by exploiting the same vulnerability.
-2008-42,WHID 2008-42: Chinese hackers steal 9 million items of personal information from South Koreans,"The Dark Visitor, a Chinese hacking insider site, and the Korean Chuson reports that a Chinese hacker used a commercially available SQL injection tool called HDMI to penetrate a large number of South Korean sites and still 9 million personal information items, which he than sold for approximately $15,000 to South Koreans for them to abuse.
",,12/30/2008,SQL Injection,Improper Input Handling,Leakage of Information,Multiple,South Korea,No,,,China,,,,,
-2008-42,WHID 2008-42: Chinese hackers steal 9 million items of personal information from South Koreans,"The Dark Visitor, a Chinese hacking insider site, and the Korean Chuson reports that a Chinese hacker used a commercially available SQL injection tool called HDMI to penetrate a large number of South Korean sites and still 9 million personal information items, which he than sold for approximately $15,000 to South Koreans for them to abuse.
",,12/30/2008,SQL Injection,Improper Input Handling,Leakage of Information,Multiple,South Korea,No,,,China,,,,,
-2008-43,WHID 2008-43: Russian nuclear power web sites attacked amid accident rumors,"Novosti, the Russian news agency reports that in what seems to be a planned dual head attack to break panic by spreading a rumor about a nuclear accident near St. Petersburg.
-2008-44,WHID 2008-44: Balkan cyber wars,"The interesting report in ZDnet about the cyber war around Kosovo is unique in describing the process. According to the report hacker groups on each side share information in order to make attacks more efficient. Some collect vulnerable web sites, while others use automatic defacement tools to attack.
-2008-45,WHID 2008-45: Comcast domain hijacked,"Recently the domain names has been the focus on hacking activity. Hackers found that hijacking a domain is as effective if not more than attacking the web site itself.
-2008-46,WHID 2008-46: CheckFree customers redirected to fraudsters sites,"In an attack with an alarming similarity to the COX incident (WHID 2008-45), but with a far greater potential damage, hackers changes the DNS records for CheckFree, the largest bill payment service in the USA. Customers where redirected to servers in the Ukraine, which attempted to install a password login software on their computers.
-2008-47,WHID 2008-47: The Federal Suppliers Guide validates login credential in JavaScript,"Alex Papadimoulis tells in a brilliantly humoristic way about the lack of security of the Federal Suppliers Guide's web site. The guide, is presumably limited to federal procurement agents only, but at the time of writing the credential checking was done on the client in JavaScript and for a single global user name and password.
-2008-48,WHID 2008-48: TicketMaster Fighting Hackers Line Bypassing,"Update (April 19th 2009) - A recent article in the Vancouver Sun further discuss the issue. While there are no new technical details, the discussion that follows the article is illuminating
-2008-49,WHID 2008-49: ValueClick weak decryption and vulnerability to SQL injection,"As a side story to ValueClick indictment of deceptive marketing by the FTC, the FTC investigation also found SQL injection vulnerabilities and lack of sufficient encryption of sensitive customer information. These findings contributed to the $2.9 million fine the FTC levied on ValueClick as well as to the company being dumped from managing eBay's affiliate program.
",,3/17/2008,SQL Injection,Improper Input Handling,Monetary Loss,Marketing,USA,No,,,,,,,,
-2008-49,WHID 2008-49: ValueClick weak decryption and vulnerability to SQL injection,"As a side story to ValueClick indictment of deceptive marketing by the FTC, the FTC investigation also found SQL injection vulnerabilities and lack of sufficient encryption of sensitive customer information. These findings contributed to the $2.9 million fine the FTC levied on ValueClick as well as to the company being dumped from managing eBay's affiliate program.
",,3/17/2008,SQL Injection,Improper Input Handling,Monetary Loss,Marketing,USA,No,,,,,,,,
-2008-50,WHID 2008-50: The Indian government acknowledges hacking incidents,"An official Indian government response to a question in the Indian parliament, the Minister of State for Communications and Information Technology discusses hacking incidents which occurred between 2005 and 2008 in a large number of Indian government agencies. The interesting information is the list of agencies affected:
-2008-51,WHID 2008-51: TrendMicro web site hit,"The infamous SQL injection bot has hit TrendMicro, worrying considering the fact that TrendMicro is there to protect us from malware. Unfortunately it seems that web security is still underrated outside of a small group of experts, even though it fast becomes the modern day equivalent of the now declining viruses and worms.
",,3/15/2008,SQL Injection,Improper Input Handling,Leakage of Information,Technology,Japan,No,,,,,,,,
-2008-51,WHID 2008-51: TrendMicro web site hit,"The infamous SQL injection bot has hit TrendMicro, worrying considering the fact that TrendMicro is there to protect us from malware. Unfortunately it seems that web security is still underrated outside of a small group of experts, even though it fast becomes the modern day equivalent of the now declining viruses and worms.
",,3/15/2008,SQL Injection,Improper Input Handling,Leakage of Information,Technology,Japan,No,,,,,,,,
-2008-52,WHID 2008-52: The Hannaford Breach,"While the Hannaford Breach which resulted in 4.2 stolen credit cards and 1800 known fraud cases may not be a web hack, a Computer World article mentioned that the company's web site was off line following the breach. Even if the breach itself was not a result of web site issues, such issues where probably found in the security review to follow the Breach making the incident a worthy addition to WHID.
",,3/17/2008,SQL Injection,Improper Input Handling,Monetary Loss,Retail,USA,No,,,,,,,,http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=Disaster+Recovery&articleId=9068999&taxonomyId=151&pageNumber=1
-2008-52,WHID 2008-52: The Hannaford Breach,"While the Hannaford Breach which resulted in 4.2 stolen credit cards and 1800 known fraud cases may not be a web hack, a Computer World article mentioned that the company's web site was off line following the breach. Even if the breach itself was not a result of web site issues, such issues where probably found in the security review to follow the Breach making the incident a worthy addition to WHID.
",,3/17/2008,SQL Injection,Improper Input Handling,Monetary Loss,Retail,USA,No,,,,,,,,http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=Disaster+Recovery&articleId=9068999&taxonomyId=151&pageNumber=1
-2008-53,WHID 2008-53: 'SQL by Design' leaks Thousands of SSNs at an Oklahoma Gov site,"Alex Papadimoulis hits again with a report on leakage of information on Oklahoma's Department of Corrections web site. The detailed report is very interesting and highlights one of the worse types of SQL injection out there: remote SQL by design.
-2008-54,WHID 2008-54: Hacker Redirects Obama's site to Hillary Clinton's,"Netcraft reports that a hacker managed to redirect traffic from Barak Obama's web site to Hillary Clinton's site during the primaries held between the two.The culprit, an XSS bug in the Obama's site community blogs section, highlights the danger of user contributed content to web sites.
-2008-55,WHID 2008-55: Hackers hijack bitchy fashion blog,"It might have been a random hack, but the pornographic pictures splashed on an insider fashion industry blog where quickly blamed on the fashion icons and magazines offended by the blog.
",,4/23/2008,Unknown,Insufficient Authentication,Defacement,Media,USA,No,,,,,,,,
-2008-55,WHID 2008-55: Hackers hijack bitchy fashion blog,"It might have been a random hack, but the pornographic pictures splashed on an insider fashion industry blog where quickly blamed on the fashion icons and magazines offended by the blog.
",,4/23/2008,Unknown,Insufficient Authentication,Defacement,Media,USA,No,,,,,,,,
-2008-56,WHID 2008-56: Soulja Boy Myspace Hacked,"This is a first time a hacking report is a video flick. If, like me, you find it hard to understand, you can read a written summary on this Kiwi site. I guess that their readers also needed a translation of the speech in the video to English.
-2008-57,WHID 2008-57: Craigslist's Battle Against Spammers,"Insufficient Anti-Automation is fat becoming the #1 threat to web sites. Since Captcha has been proved practically useless, especially when there is a financial gain from automating access to the site, sites are pretty much defenceless against harmful automation. Techdirt's story about Craigslist losing the battle against automation tool is a very good example of this serious problem.
-2008-58,WHID 2008-58: New Orkut Worm in Brazil,"XSSed reports another XSS worm in Orkut. Since Orkut is big in Brazil, it is quite natural that a Brazilian group created the worm.
-2008-59,WHID 2008-59: Spotify Streaming Music Service Hacked and Millions of Records Leaked,"This time we may need to remove the word ""web"" leaving this incident classified only as ""application security"". Spotify is a new music streaming radio like service from Sweden. A weakness in Spotify streaming protocols enables hackers to gain access to users' encrypted passwords, email address, birth date, gender, postal code and billing receipt.
-2008-60,WHID 2008-60: Miley Cyrus Pictures Leaked Due to a Web Hack (Updated),"Update (April 19th 2009) - E!News provides additional interesting details about Josh Holly, the hacker who carried out the attack. They actually took the trouble to go to Holly's hometown and and ask people about him,providing an interesting insight into the celebs hacking phenomena.
-2008-61,WHID 2008-61: 7-Eleven Hack From Russia Led to ATM Looting in New York,"In his most-recent plea agreement, filed in court Monday, confessed hacker Albert Gonzalez admitted conspiring in the 7-Eleven breach and fingered two Russian associates as the direct culprits. The Russians are identified as ???Hacker 1??_ and ???Hacker 2??_ in Gonzalez???s plea agreement, and as ???Grigg??? and ???Annex??? in an earlier document inadvertently made public by his attorney.
-2009-10,WHID 2009-10: MacRumorsLive feed hack,"It seems that if the worse thing that can happen to hackers is a real accident to Apple's CEO Steve Jobs. The number of hacks devoted to informing us about his fictitious accidents is just overwhelming. In this case AnantaSec reports a hack into Mac Rumors feed that was possible simply because a file with the administrator password was laying around accessible to anyone due to an administration error.
",,1/7/2009,Unintentional Information Disclosure,Application Misconfiguration,Disinformation,Media,USA,No,,,,,,,,
-2009-11,WHID 2009-11: Lil Kim Facebook Hacked,"I am not sure why rappers web presence is so often hacked. They might be the first generation of artists to use the web, brightly combining great Internet skills with technophobia which leads to basic operational errors. Or it might be the underground nature of the artists that (mis)manage their web presence by themselves.
-2009-12,WHID 2009-12: Embassy of India in Spain found serving remote malware through iFrame attack,"Ismael Valenzuela sent us a story about yet another malware through iFrame serving site. This time it is an official one, belonging to the Indian government official branch in Spain - it's embassy.
-2009-13,WHID 2009-13: Wikipedia Biography Hacking,"This incident might have not gotten into the Web Hacking Incident Database a year ago. However a heated discussion on the Web Application Security Consortium threat classification project reminded me that content spoofing is a potent attack vector by itself, actually one of the most dangerous there.
-2009-15,WHID 2009-15: Kanye West has been Hacked,"Celebrities web presence hacking is topping 2009 incidents list, and rappers seem to lead. However this report in the Ampersand, like the Lil Kim story from the same week,is somewhat questionable. In both cases it seem that uncomfortable content was blamed on hacking.
-2009-16,WHID 2009-16: Primary schools hit by smut hack,"Not all defacement are created equal. I have a second grader who has just started to use her school's web site so this defacement of 20 primary school web sites with porn hit me deep inside. We do so much to screen our young ones from the sleazy world outside, and getting it in the school's web site is just unimaginable. Just thinking about the questions I would be asked if my daughter would get such pages.
-2009-17,WHID 2009-17: Passwords are optional at SpeedDate,"TechCrunch reports that for a short period of time, SpeedDate, an online dating service did not require a password. If you knew someone's user name you could login. Talking about ""lack of sufficient authentication controls...""
-2009-18,WHID 2009-18: phpBB web site hacked using LFI,"phpBB was known for years as one of the most insecure software packages out there. It is responsible for one for one of the 1st application layer worm, Santy back in 2004. How ironic is that its own web site was seriously breached due to a vulnerability in another software package used...
-2009-1,WHID 2009-1: Gaza conflict cyber war,"Update (Jan 13, 2009) - Ynet, an Israeli paper, reports that many of the sites defaced where actually DNS hijacked following a break-in to the servers of DomainTheNet, an Israeli registrar. And just like other recent DNS hijacking incidents, the fault was lack of sufficient authentications and the hackers got hold of passwords to the administration system.
-2009-20,WHID 2009-20: BitDefender joins Kasperski on the Breached side,"Uno, the Romanian hacker responsible for penetrating the Kasperski web site, reported repeating the trick also on the web site of the Polish distributor of BitDefender, another anti-virus software vendor.
",,2/9/2009,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,No,,,Romania,,,,,
-2009-20,WHID 2009-20: BitDefender joins Kasperski on the Breached side,"Uno, the Romanian hacker responsible for penetrating the Kasperski web site, reported repeating the trick also on the web site of the Polish distributor of BitDefender, another anti-virus software vendor.
",,2/9/2009,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,No,,,Romania,,,,,
-2009-21,WHID 2009-21: This Time Uno is after the Herald Tribute,"I must admit that Uno, the Romanian hacker behind a series of intrusions in recent days is a bit of a cheat for the Web Hacking Incident Database. We usually do not report vulnerabilities that where not exploited. While we understand their importance, they do not fall under the criteria set for WHID. For now we list them in a separate page, waiting for a place to be files in.
-2009-22,WHID 2009-22: Federal Travel Booking Site Spreads Malware (Updated),"Updated (Feb 22nd 2009) - the Washington Post updates that the hack exploited a problem with the default configuration of the authentication module used for authenticating remote administrators. As a result we categorized this incident under ""insufficient authentication"" and ""misconfiguration"".
-2009-23,WHID 2009-23: Miley Cyrus Twitter Account Hit By Sex-Obsessed Hacker,"It is Twitter again, it is a celebrity again. Why don't they keep their password to themselves. This incident is even uglier as the attacker posted obscene content on the Twitter account of the 16 years old actress Miley Cyrus. This is not the first attack targeting Miley Cyrus. As reported by WHID, her personal G-mail account was hacked last year and personal pictures were stolen and published online.
-2009-24,WHID 2009-24: New Phishing Attacks Combine Wildcard DNS and XSS,"Netcraft, one of the leading authorities on phising research, reports a Phishing scam that involves XSS.
-2009-25,WHID 2009-25: Zone-H defaced,"Whenever a defacement appears in WHID we need to explain why. After all isn't Zone-H a better repository of simple defacement. Well, yes, but according to this report by The Register this time it was Zone-H which was defaced. The defaced site seen on the right, is available here. I am sure it is just a matter of time before we add a WHID defacement to WHID...
-2009-26,WHID 2009-26: F-Secure Joins The Breached AV Vendors Club,"It wasn't surprising that after attacking a Kaspereski and a BitDefender web sites, Uno, the Romanian hacker, would continue to strike anti-virus vendors. This time he found a vulnerability in the web site of Finish AV vendor F-Secure. Somewhat less severe than the others, the vulnerability enabled the hacker only to access virus statistics.
-2009-27,WHID 2009-27: Panasonic Products for Cheap,"A report suggests that the UK retail site of the electronic equipment giant Panasonic was hacked and prices of products where set to pennies. Since the incident followed a layoff of 15,000 employees, it is assumed to be a disgruntled employees doing.
",,2/14/2009,Unknown,Unknown,Monetary Loss,Retail,UK,No,,,,,,,,
-2009-27,WHID 2009-27: Panasonic Products for Cheap,"A report suggests that the UK retail site of the electronic equipment giant Panasonic was hacked and prices of products where set to pennies. Since the incident followed a layoff of 15,000 employees, it is assumed to be a disgruntled employees doing.
",,2/14/2009,Unknown,Unknown,Monetary Loss,Retail,UK,No,,,,,,,,
-2009-28,WHID 2009-28: Serious Leakage on Mac clone Maker's site,"The Register reports that the online shop of Psystar, a maker of Mac compatible equipment is heavily leaking technical information that can be expoited to hack the site.
",,2/11/2009,Misconfiguration,Application Misconfiguration,Leakage of Information,Retail,USA,No,,,,,,,,
-2009-28,WHID 2009-28: Serious Leakage on Mac clone Maker's site,"The Register reports that the online shop of Psystar, a maker of Mac compatible equipment is heavily leaking technical information that can be expoited to hack the site.
",,2/11/2009,Misconfiguration,Application Misconfiguration,Leakage of Information,Retail,USA,No,,,,,,,,
-2009-29,WHID 2009-29: FBI & Secret Service warn of a sophisticated HSM attack,"A very interesting report by the FBI together with the US Secret service outlines a scheme exploiting SQL injection to steal credit card information from financial institutes. The attack involves directly attacking HSMs, the banks key vaults in charge of verifying ATM PINs in order to brute force PIN numbers.
-2009-2,WHID 2009-2: Twitter accounts of the famous hacked (Updated),"Update (Jan 11th 2009) - The hacker bragged about the hack and revealed that it was a brute force dictionary attack against an administrator account. Twitter does not block repetitive login failures therefore enabling brute force attacks. We are still leaving the incident classification ""insufficient authentication"" in addition to brute force as we feel an administration interface should have additional authentication mechanism and not just a password.
-2009-30,WHID 2009-30: Sage SaaS Withdrawn Due to Security Flaws,"While we have no public record of an exploit in this case, it seems that the mare discovery of vulnerabilities in sage new SaaS (software as a service) offering created so much damage to classify it as an incident.
-2009-31,WHID 2011-89: China Implicated In Hacking Of SMB Online Bank Accounts,"Twitter is certainly bypassing Facebook as the most popular site out there, at least when it comes to security incidents.This time somebody decided abuse Twitter to demonstrate Clickjacking, an attack that RSname and Jeremiah Grossman re-christened in the OWASP conference in New York in September.
-2009-32,WHID 2009-32: 750 Twitter Accounts Hacked,"Twitter reports in a blog entry that 750 accounts were hacked. The hacker posted messages linking to a porn webcam. While Twitter did not disclose how the attack was carried out, the suggested remediation hints that the account passwords were guessed, probably using a brute force attack.
",,3/10/2009,Brute Force,Insufficient Anti-automation,Link Spam,Web 2.0,USA,No,,,,,,Password,750,
-2009-32,WHID 2009-32: 750 Twitter Accounts Hacked,"Twitter reports in a blog entry that 750 accounts were hacked. The hacker posted messages linking to a porn webcam. While Twitter did not disclose how the attack was carried out, the suggested remediation hints that the account passwords were guessed, probably using a brute force attack.
",,3/10/2009,Brute Force,Insufficient Anti-automation,Link Spam,Web 2.0,USA,No,,,,,,Password,750,
-2009-33,WHID 2009-33: eBay Fraud Abuses Zero Day XSS,"A zero day XSS vector enables hackers to include in an eBay offer an arbitrary code which is executed by both FireFox and IE. As a result they were able to spoof the content of the offer, so that the user saw different information than the details known to eBay.
-2009-34,WHID 2009-34: Romanian Hacker Moves On To The Telegraph,"Another week, another hack by the HackerBlog, and when it targets an important web site and the impact is severe it is worthy of WHID. This time the Romanian hacker used blind SQL injection to penetrate to the web site of the Telegraph, a leading English daily paper.
-2009-35,WHID 2009-35: Former US Senator Donors Information Leaks,"Norm Coleman, a former senator from Minnesota, is going through a legal battle to try to win back his seat in the senate. If the way he manages his web site security and the crises it created are an indicator, I am not sure that he has a place there.
-2009-36,WHID 2009-36: Hackers steal Austalian and NZ Shell customer info (Updated),"Update (Apr 19th 2009) - (Presumably) the hacker posted a comment to this story with some details. He says that the Number_of_Records leaking was much higher: 17,000 Aussies and 7,000 Kiwis. The rest we did not understand and hope that either he or any of you can clarify.
-2009-37,WHID 2009-37: Twitter XSS/CSRF worm series (Updated),"Update (Apr 19th 2009) - The initial Mooney Twitter worm has evolved into a series of 5 worms at the time of writing, each exploiting a different vulnerability in Twitter. The latest one specifically focuses on twitter accounts who have a high number of followers thus targeting celebrities such as Ashton Kutcher and Oprah Winfrey according to Graham Cluley from Sophos.
-2009-38,WHID 2009-38: Time's Poll For Most Influencial Hacked,"Polls are easy target for automation abuse. You can usually participate anonymously and the poll operator has an interest in drawing as many participants as possible, but as demonstrated by previous incidents such loose security enables hackers to distort the results.
-2009-39,"WHID 2009-39: Uno is back: 245,000 records stolen from Orange France using SQL injection","After focusing earlier this year on Anti-Virus vendors, Uno, the Romanian Hacker is now back and reports in his blog that an Orange France web site dedicated to photo management is vulnerable to SQL injection and that he was able to access 245,000 records from the web site.",http://www.hackersblog.org/2009/05/25/orange-is-so-cool/,5/26/2009,SQL Injection,Improper Input Handling,Leakage of Information,Service Providers,France,No,,,Romania,,,,245000,
-2009-39,"WHID 2009-39: Uno is back: 245,000 records stolen from Orange France using SQL injection","After focusing earlier this year on Anti-Virus vendors, Uno, the Romanian Hacker is now back and reports in his blog that an Orange France web site dedicated to photo management is vulnerable to SQL injection and that he was able to access 245,000 records from the web site.",http://www.hackersblog.org/2009/05/25/orange-is-so-cool/,5/26/2009,SQL Injection,Improper Input Handling,Leakage of Information,Service Providers,France,No,,,Romania,,,,245000,
-2009-3,WHID 2009-3: Google Trends Falls Victim to a Stunt,"Someone, and not for the 1st time, succeeded in manipulating Google Trends, a Google service listing popular search terms. In this case the New York Time reports that a symbol at presumably denoting 9/11 reached number 2 in the list of hot Trends (see picture right).
-2009-40,WHID 2009-40: SQL injection Hits Sensitive US Army servers,"Information Week reports that a well known Turkish hacker penetrated two sensitive US army servers, one at McAlester Ammunition Plant in McAlester, Okla., and the other at the U.S. Army Corps of Engineers' Transatlantic Center in Winchester, Va. The hacks are the currently under criminal investigation by Defense Department officials.
-2009-41,WHID 2009-41: Malware in Advertizing at Digital Spy,"The register reports that Digital Spy, a high profile UK gossip site carried banner inflicting ads. Digital Spy has acknowledged the issue and said it promptly addressed it, however details on the source of the malicious banners is still not availalbe.
-2009-42,WHID 2009-42: Puerto Rico sites redirected in a DNS attack,"Attacking web sites by going to the source, targeting DNS servers rather than the web sites themselves shows both the boldness of hackers as well as the fragility of the Internet.
-2009-43,WHID 2009-43: Web Mail Company to Pay Prize After CEO Hacked,"What does a challenge to break an web mail system and get $10,000, broken within minutes prove? Is it a lesson in vanity? Or about the state of web security? Or about security in general. Probably all.
-2009-45,WHID 2009-45: Vaserv Hacked and Owner Commits Suicide Over Data Loss,"This must be the worse incident reported by the Web Hacking Incident Database.
-2009-46,WHID 2009-46: Clickjacking Attack Hit Facebook,"The Facebook clickjacking assault appeared as a comment posted to the account of a user along with a photograph, which enticed him to hit it. On clicking the link, it led the user to a web-page, which pretended to be a CAPTCHA test. It also prompted him to hit a blue colored button namely ""Share"" embedded in the Facebook web-page.
-2009-47,WHID 2009-47: Morrison says 'new baby' story a hoax by web hacker,"A hoax, posted by a hacker on Van Morrison's website, falsely claimed the singer (64) had a baby with a woman called Gigi Lee.
-2009-48,WHID 2009-48: XSS Embedded iFrames,"Today we saw a variety of pages being advertised that have search.htm and other pages vulnerable to cross-site scripting (XSS) being used to inject an iframe to a malicious webpage redirector. To an unknowing user following such an advertisement, they would believe that they were just visiting the intended host site unaware that the iframe was also redirecting them to malicious content.",http://research.zscaler.com/2009/12/xss-embedded-iframes.html,12/14/2009,Cross Site Scripting (XSS),Improper Output Handling,Planting of Malware,Information Services,,No,,,,,,,,
-2009-48,WHID 2009-48: XSS Embedded iFrames,"Today we saw a variety of pages being advertised that have search.htm and other pages vulnerable to cross-site scripting (XSS) being used to inject an iframe to a malicious webpage redirector. To an unknowing user following such an advertisement, they would believe that they were just visiting the intended host site unaware that the iframe was also redirecting them to malicious content.",http://research.zscaler.com/2009/12/xss-embedded-iframes.html,12/14/2009,Cross Site Scripting (XSS),Improper Output Handling,Planting of Malware,Information Services,,No,,,,,,,,
-2009-49,WHID 2009-49: RockYou Hack: From Bad To Worse,"Earlier today news spread that social application site RockYou had suffered a data breached that resulted in the exposure of over 32 Million user accounts. To compound the severity of the security breach, it was found that RockYou are storing all user account data in plain text in their database, exposing all that information to attackers. RockYou have yet to inform users of the breach, and their blog is eerily silent ??? but the details of the security breach are going from bad to worse.",http://techcrunch.com/2009/12/14/rockyou-hack-security-myspace-facebook-passwords/,12/14/2009,SQL Injection,Improper Input Handling,Leakage of Information,Web 2.0,,No,,,,,,,,
-2009-49,WHID 2009-49: RockYou Hack: From Bad To Worse,"Earlier today news spread that social application site RockYou had suffered a data breached that resulted in the exposure of over 32 Million user accounts. To compound the severity of the security breach, it was found that RockYou are storing all user account data in plain text in their database, exposing all that information to attackers. RockYou have yet to inform users of the breach, and their blog is eerily silent ??? but the details of the security breach are going from bad to worse.",http://techcrunch.com/2009/12/14/rockyou-hack-security-myspace-facebook-passwords/,12/14/2009,SQL Injection,Improper Input Handling,Leakage of Information,Web 2.0,,No,,,,,,,,
-2009-4,WHID 2009-4: Twitter Personal Info CSRF,"Gareth Heyes (and others) reported an interesting vulnerability in Twitter last week. While his post included a proof of concept code, it does not qualify as a hack only a vulnerability disclosure and the Web Hacking Incident Database does not list vulnerabilities.
-2009-50,WHID 2009-50: Iranian hacker attack: What will it cost Twitter?,"A new attack by hackers Dec. 17 redirected Twitter users to a page from a previously unknown group called the Iranian Cyber Army. Most computer attacks are relatively straightforward denial-of-service attacks, where computers overwhelm a website with data to bring it down. Thursday night's attack against Twitter was more serious because the hackers gained access to part of Twitter's network and were able to redirect users to a page with a photo of a flag with Farsi script. Near the top of the page ran a bold red headline in English: ""This site has been hacked by Iranian Cyber Army.""
-2009-51,WHID 2009-51: Hacker Hits RBS WorldPay Systems Database,"A Romanian hacker well-known for discovering SQL injection vulnerabilities in high-profile Websites has struck again -- this time on RBS WorldPay's site, where he says he hit the jackpot, the company's database.
-2009-5,"WHID 2009-5: School data hacked, grades altered","This story about student hacking a Pottsville, PA school online system and changing grades demonstrated again that password stealing is by far the most common method in which web sites are hacked.
-2009-6,WHID 2009-6: InfoGov switch hosting due to lack of security,"This gem is taken out of a press release issued by a hosting provider. According to the press release, InfoGov, a UK provider of risk management solutions, switched hosting its sites to a new provider because the previous one did not provide adequate solution to an SQL injection attack that penetrated the site and inflicted Malware on InfoGov customers.
-2009-7,WHID 2009-7: China's Yeepay.com Suffers Internet Payment Hacker Attack,"China retail news reports that Yeepay, a Chinese online payments provider suffered a major denial of service attack. The story seems to be big in China, but hardly made it to the west.
",,1/19/2009,Denial of Service,Insufficient Anti-automation,Downtime,Finance,China,No,,,,,,,,
-2009-8,WHID 2009-8: Wired.com Image Viewer Hacked to Create Phony Steve Jobs Health Story,"John Abell from Wired magazine often writes about Apple's CEO health. However, this report about Job suffering a cardiac arrest, was neither his nor true. The culprit was Wired public image viewing utility which lets people upload am image and than presented the image as part of the Wired web site, banner and domain included.
-2009-9,WHID 2009-9: MetaFilter suffers an SQL injection attack,"MetaFilter philosophy is that social norms and peer pressure, referred to as ""self-policing"", will ensure the quality of the content of the site. However is seems that this philosophy does not extend to hackers who abuse the site's software to plant Malware affecting MetaFilter users.
",,1/24/2009,SQL Injection,Improper Input Handling,Planting of Malware,Web 2.0,USA,No,,,,,,,,
-2010-100,WHID 2010-100: Chinaz.com compromised,"Websense Security Labs??? ThreatSeeker??? Network has discovered that the speed testing site of chinaz.com has been compromised.
-2010-101,WHID 2010-101: 37 million passwords stolen on the site of Skyrock?,"A hacker broke the huge database site which had registered 36.7 million Internet users, raising fears of massive consequences. The Site Skyrock has sent a message to its internet users the message of the team to its Internet Skyrock
-2010-102,WHID 2010-102: Denver's website hacked twice in one week,"The city and county of Denver website was pulled down Monday night after it was hacked, the second such attack in a week.
-2010-103,WHID 2010-103: SEO SPAM network - Details of the wp-includes infection,"We have been digging lately in a large SEO SPAM network which is using thousands of compromised sites to increase their page rankings and spread malware. They are similar to the one we reported earlier affecting lean.mit.edu, but this time they seem focused only on Wordpress web sites
-2010-104,WHID 2010-104: Code Security: MidAmerican Energy's top priority after SQL injection attacks,"""Last May we had an incident where one of our web pages was exploited through an SQL injection flaw,"" Kerber said. ""It was a wake-up call that we had vulnerabilities people could find out about.""",http://www.csoonline.com/article/594613/Code_Security_MidAmerican_Energy_s_top_priority_after_SQL_injection_attacks,5/21/2010,SQL Injection,Improper Input Handling,Leakage of Information,Energy,USA,No,,,,,,,,
-2010-104,WHID 2010-104: Code Security: MidAmerican Energy's top priority after SQL injection attacks,"""Last May we had an incident where one of our web pages was exploited through an SQL injection flaw,"" Kerber said. ""It was a wake-up call that we had vulnerabilities people could find out about.""",http://www.csoonline.com/article/594613/Code_Security_MidAmerican_Energy_s_top_priority_after_SQL_injection_attacks,5/21/2010,SQL Injection,Improper Input Handling,Leakage of Information,Energy,USA,No,,,,,,,,
-2010-105,WHID 2010-105: Poll removed due to widespread ballot stuffing and hacking,"Dear users, yesterday we began a poll about the controversial immigration bill SB 1070 asking users what was their sentiment on the bill. It spread virally and was shared on facebook over 500 times and viewed over 10,000 times.
-2010-106,WHID 2010-106: AMC website vulnerable to hackers,"With a weak network security, the website http:// www.egovamc.com. has several chinks in its armour and is a ready invitation for hackers. The issue has been brought to notice of senior AMC officials and only recently they effected a few cosmetic security patch-ups for their website.
-2010-107,WHID 2010-107: Hackers Take Over BP Twitter Feed,"BP's Twitter account looked to have fallen victim to hackers early Thursday, with a post referencing a fictional character from a popular fake BP microblog page.
-2010-108,WHID 2010-108: Cyber Thieves Rob Treasury Credit Union,"Organized cyber thieves stole more than $100,000 from a small credit union in Salt Lake City last week, in a brazen online robbery that involved dozens of co-conspirators, KrebsOnSecurity has learned.
-2010-109,WHID 2010-109: Viral clickjacking 'Like' worm hits Facebook users,Hundreds of thousands of Facebook users have fallen for a social-engineering trick which allowed a clickjacking worm to spread quickly over Facebook this holiday weekend.,http://www.sophos.com/blogs/gc/g/2010/05/31/viral-clickjacking-like-worm-hits-facebook-users/,5/31/2010,Clickjacking,Insufficient Process Validation,Worm,Web 2.0,USA,No,,,,Facebook,,,,
-2010-109,WHID 2010-109: Viral clickjacking 'Like' worm hits Facebook users,Hundreds of thousands of Facebook users have fallen for a social-engineering trick which allowed a clickjacking worm to spread quickly over Facebook this holiday weekend.,http://www.sophos.com/blogs/gc/g/2010/05/31/viral-clickjacking-like-worm-hits-facebook-users/,5/31/2010,Clickjacking,Insufficient Process Validation,Worm,Web 2.0,USA,No,,,,Facebook,,,,
-2010-10,"WHID 2010-10: FBI, police ID Boulder synagogue Web site hacker",Boulder police and the FBI announced Friday that they have identified the individual who hacked into the Web sites of two Boulder synagogues and the Boulder Rabbinic Council last week and defaced them with anti-Semitic messages.,http://www.dailycamera.com/ci_14150610?source=most_emailed#axzz0ieLUTxxC,1/2/2010,Unknown,Improper Output Handling,Defacement,Religious,"Boulder, CO",No,,,,,,,,
-2010-110,"WHID 2010-110: Local restaurant's computer hacked, customers' card numbers stolen","The computer system at a local Mexican restaurant was hacked, and investigators believe thieves made off with the credit card numbers of hundreds of customers. ""They know that it was a breach, and they know that the breach came from Russia, that's for sure,"" explained Blanca Aldaco. ""So, we are working with our I.T. guy. They're definitely looking into. Hopefully, they can figure out what the IP address is.""
-2010-111,WHID 2010-111: Thieves steal virtual furniture from unsuspecting Hotel Habbo players,"Finnish police are searching for thieves who stole 1,000 Euros (about $1,200 U.S.) worth of virtual furniture and other items from the virtual world Habbo Hotel. The thieves allegedly used phishing scams to the capture usernames and passwords from Habbo Hotel users, who contacted Finnish police after they noticed that their virtual goods missing.",http://www.gamezebo.com/news/2010/06/02/thieves-steal-virtual-furniture-unsuspecting-hotel-habbo-players,6/2/2010,Phishing,Insufficient Authentication,Monetary Loss,Entertainment,Finland,No,,,,,,,,
-2010-111,WHID 2010-111: Thieves steal virtual furniture from unsuspecting Hotel Habbo players,"Finnish police are searching for thieves who stole 1,000 Euros (about $1,200 U.S.) worth of virtual furniture and other items from the virtual world Habbo Hotel. The thieves allegedly used phishing scams to the capture usernames and passwords from Habbo Hotel users, who contacted Finnish police after they noticed that their virtual goods missing.",http://www.gamezebo.com/news/2010/06/02/thieves-steal-virtual-furniture-unsuspecting-hotel-habbo-players,6/2/2010,Phishing,Insufficient Authentication,Monetary Loss,Entertainment,Finland,No,,,,,,,,
-2010-112,WHID 2010-112: Turkish Cyber Hackers Strike at Israel,The unofficial Likudnik website was targeted by angry Turkish hackers who were apparently less than pleased with the IDF Navy commando operation which prevented the terrorists on board from breaking the Gaza embargo on Hamas-controlled Gaza.,http://www.theyeshivaworld.com/news/Israeli+News/60651/Turkish-Cyber-Hackers-Strike-at-Israel.html,6/2/2010,Unknown,Unknown,Defacement,Government,Israel,No,,,Turkey,,,,,
-2010-112,WHID 2010-112: Turkish Cyber Hackers Strike at Israel,The unofficial Likudnik website was targeted by angry Turkish hackers who were apparently less than pleased with the IDF Navy commando operation which prevented the terrorists on board from breaking the Gaza embargo on Hamas-controlled Gaza.,http://www.theyeshivaworld.com/news/Israeli+News/60651/Turkish-Cyber-Hackers-Strike-at-Israel.html,6/2/2010,Unknown,Unknown,Defacement,Government,Israel,No,,,Turkey,,,,,
-2010-113,WHID 2010-113: Facebook plugs email address indexing bug,"Incident-prone social network monolith Facebook has plugged yet another security leak, this time involving the indexing by search engines of email addresses not listed on Facebook. Thousands of email addresses submitted using Facebook's ""Find a friend"" feature that were not tied to a Facebook account wound up getting indexed by Google, according to Blogger Cory Watilo, who was among those affected.
-2010-114,WHID 2010-114: Seven held in Andhra for hacking passport software,"Seven people were arrested in Andhra Pradesh for hacking the online passport application software of the Hyderabad regional passport office, police said Friday.
-2010-115,WHID 2010-115: Mass hack plants malware on thousands of webpages,"More than 100,000 webpages, some belonging to newspapers, police departments, and other large organizations, have been hit by an attack over the past few days that redirected visitors to a website that attempted to install malware on their machines.
-2010-116,WHID 2010-116: Hackers: Data Breach Exposed iPad Owners' Personal Info,"A security flaw in AT&T's network exposed the e-mail addresses of more than 100,000 owners of Apple's 3G iPad, according to a report published by Gawker today.
-2010-117,WHID 2010-117: Turkish Hacker Hijacks .CO.IL MSN and Hotmail Domains,"A Turkish hacker has managed to hijack msn.co.il and hotmail.co.il, two domains belonging to Microsoft, and use them to post a pro-Palestinian message. The name servers and administrative email address for the domains have been changed.
-2010-118,WHID 2010-118: Two Korean govt. websites attacked by hackers,"Two South Korean government Web sites were attacked again Saturday by hackers traced to China, but there was no major damage, the home ministry said.
-2010-119,WHID 2010-119: Georgia government sites hacked (and spreading malware),"*UPDATE: A few hours after this post, they removed the malware from justice.gov.ge and other sites. I am glad we had some effect.
-2010-11,WHID 2010-11: U.S. Military Equipment Website Hacked,"A Lebanese hacker is taking credit for a security breach on the PEO Soldier Army website. By exploiting an SQL injection vulnerability, he allegedly obtained full access to the underlying database and the information contained within.",http://news.softpedia.com/news/U-S-Military-Equipment-Website-Hacked-131947.shtml,1/13/2010,SQL Injection,Improper Input Handling,Leakage of Information,Government,USA,No,,,Lebanon,,,,,
-2010-120,WHID 2010-120: Colombian government sites hacked (and spreading malware),"You would expect that a security-related web site would be secure, no? What about an official web site from a Government? Should that be safe? What about a government web site about security? Shouldn???t that be ultra super secure? (yes, I am joking )
-2010-121,WHID 2010-121: Second round of GoDaddy sites hacked,"It seems that a second round of attacks are happening today at GoDaddy and infecting all kind of sites (Joomla, Wordress,etc). Looking at the modification dates on the files, they all happened May 1st (today) during the morning from 1 to 3/4 am.
-2010-122,WHID 2010-122: Attack of WordPress Blogs on Rackspace,"If you follow our blog, you probably noticed that these last few months have been specially hard for hosting companies. Lots of them got hacked, bringing down thousands of sites with them. Now we are hearing reports of a mass hack of WordPress blogs hosted on Rackspace.
-2010-123,WHID 2010-123: Botnet hijacks web servers for DDoS campaign,"Researchers at Imperva have discovered an 'experimental' botnet that uses around 300 hijacked web servers to launch high-bandwidth DDoS attacks.
-2010-124,WHID 2010-124: Riyad Bank Website Gets Hacked,"Saudi bank Riyad Bank has been hacked by a group of hackers who posted a message demanding to end the service of the Mayor of Al Madina province in Saudi Arabia. Al Madina is the second holiest city in Islam, and the burial place of the Prophet Muhammad peace be upon him and it is the capital of the first Islamic state established by the Prophet and his companions after early Muslims migrated from oppression imposed by their people in Mecca around 1400 years ago.
-2010-125,WHID 2010-125: Eastern European banks under attack by next-gen crime app,"Banks in Russia and Ukraine are under continued siege by criminal gangs wielding a sophisticated, next-generation exploitation kit that hacks the financial institutions' authentication system and then hits it with a denial-of-service attack.
-2010-126,WHID 2010-126: Website breached by hacker through SQL injection - exposing personal information of customers,"New Hampshire breach notification: HBDirect.com - Website hacked through SQL injection - exposing credit cards of customers from December 1, 2009 to February 10, 2010. 19 NH residents affected.",http://datalossdb.org/primary_sources/2548,3/24/2010,SQL Injection,Improper Input Handling,Credit Card Leakage,Entertainment,"New Hampshire, USA",No,,,,,,,,
-2010-126,WHID 2010-126: Website breached by hacker through SQL injection - exposing personal information of customers,"New Hampshire breach notification: HBDirect.com - Website hacked through SQL injection - exposing credit cards of customers from December 1, 2009 to February 10, 2010. 19 NH residents affected.",http://datalossdb.org/primary_sources/2548,3/24/2010,SQL Injection,Improper Input Handling,Credit Card Leakage,Entertainment,"New Hampshire, USA",No,,,,,,,,
-2010-127,WHID 2010-127: Israeli hacker hits IHH website,"An Israeli hacker managed to break into the website of Turkish IHH group, which organized the Gaza flotilla, disabling the organization's fundraising mechanism for a few hours.
-2010-128,WHID 2010-128: Microsoft Sues Alleged Spammer For Circumventing Filters,"Microsoft has sued Connecticut resident Boris Mizhen for allegedly gaming Hotmail's spam filters and sending unwanted emails to consumers. Mizhen, who previously settled a separate spam lawsuit brought by Microsoft, allegedly got around the company's anti-spam system by creating millions of new email accounts and then arranging for those accounts to classify his messages as ""not spam,"" according to the lawsuit.
-2010-129,"WHID 2010-129: Hackers Seize Top Tory???s Facebook, Blog & Twitter Accounts","hackers have stolen the account details of Therese Coffey, Tory candidate for Suffolk Coastal (UK Parliament constituency), London Spin can exclusively reveal. The attackers bombarded social media users with sexually explicit messages and comments after gaining access to her Blog, Facebook and Twitter account details.",http://www.londonspinonline.com/2010/06/exclusive-hackers-seize-top-torys.html,6/17/2010,Unknown,Insufficient Authentication,Disinformation,Web 2.0,"London, England",No,,,,,,,,
-2010-129,"WHID 2010-129: Hackers Seize Top Tory???s Facebook, Blog & Twitter Accounts","hackers have stolen the account details of Therese Coffey, Tory candidate for Suffolk Coastal (UK Parliament constituency), London Spin can exclusively reveal. The attackers bombarded social media users with sexually explicit messages and comments after gaining access to her Blog, Facebook and Twitter account details.",http://www.londonspinonline.com/2010/06/exclusive-hackers-seize-top-torys.html,6/17/2010,Unknown,Insufficient Authentication,Disinformation,Web 2.0,"London, England",No,,,,,,,,
-2010-12,WHID 2010-12: Army Website Compromised Through SQL Injection,"A Romanian grey hat hacker has disclosed an SQL inject (SQLi) vulnerability on a website belonging to the United States Army, which leads to full database compromise. The website, called Army Housing OneStop, is used to provide information about military housing facilities to soldiers.",http://news.softpedia.com/news/Army-Website-Compromised-Through-SQL-Injection-131649.shtml,1/9/2010,SQL Injection,Improper Input Handling,Leakage of Information,Government,USA,No,,,Romania,,,,,
-2010-130,WHID 2010-130: Google Trends Hacked With Racial Slur (Again!),"Google Trends is a powerful tool that many media companies (us included) rely upon for a sense of what new topics people are searching for at any given time -- at least, when it's not getting hacked with racial slurs, which is exactly what happened early this morning.
-2010-131,WHID 2010-131: DoS attack stuffs Turkey's internet censors,"Access to the internet in Turkey is becoming increasingly ragged, as growing state censorship collides with retaliation by anti-censorship hackers, leading to difficulties both in viewing sites and applying key online functions.
-2010-132,WHID 2010-132: Another Opposition Website Shut Down by Hackers,"The popular Burmese Web site photayokeking.org, edited by a Burmese army deserter, was recently attacked, leaving it inaccessible and out of operation.
-2010-133,WHID 2010-133: Druknet websites hacked,"Local internet service provider (ISP) Druknet is currently recovering, after 50 of its websites were hacked early yesterday.
-2010-134,WHID 2010-134: Major hack of Israeli Twitter accounts,"According to Mikko Hyponnen, chief research officer with F-Secure, more than 1000 accounts on the microblogging social networking service were hacked within the space of 12 hours, each of them broadcasting the message: ""Hacked by Turkish Hackers.""
-2010-135,WHID 2010-135: Another round of Asprox SQL injection attacks,"Earlier this month, we reported on a new variant of Asprox malware which was being spammed out by the Pushdo botnet. At that time, the Asprox executables we analyzed were purely sending spam. However, a few days after our post, we noticed reports of mass infections of IIS/ASP websites. The nature of these attacks reminded us of SQL injection attacks back in 2008 where Asprox was clearly involved. We suspected that the re-emergence of Asprox and these new mass website infections were not merely a coincidence. Well, this week our suspicions were confirmed when we came across another version of Asprox which started to launch both spam and SQL injection attacks.","http://www.m86security.com/labs/i/Another-round-of-Asprox-SQL-injection-attacks,trace.1366~.asp",6/23/2010,SQL Injection,Improper Input Handling,Planting of Malware,Multiple,,No,,,,,,,,
-2010-135,WHID 2010-135: Another round of Asprox SQL injection attacks,"Earlier this month, we reported on a new variant of Asprox malware which was being spammed out by the Pushdo botnet. At that time, the Asprox executables we analyzed were purely sending spam. However, a few days after our post, we noticed reports of mass infections of IIS/ASP websites. The nature of these attacks reminded us of SQL injection attacks back in 2008 where Asprox was clearly involved. We suspected that the re-emergence of Asprox and these new mass website infections were not merely a coincidence. Well, this week our suspicions were confirmed when we came across another version of Asprox which started to launch both spam and SQL injection attacks.","http://www.m86security.com/labs/i/Another-round-of-Asprox-SQL-injection-attacks,trace.1366~.asp",6/23/2010,SQL Injection,Improper Input Handling,Planting of Malware,Multiple,,No,,,,,,,,
-2010-136,"WHID 2010-136: Hotel account hacked, card info stolen",Dozens of Driskill Hotel customers' credit card information has been stolen. Hackers in Europe were able to break into the hotel's parent company's website and steal the information. There are more than 700 victims nationwide.,"http://www.kxan.com/dpp/news/hotel-account-hacked,-card-info-stolen",6/23/2010,SQL Injection,Improper Input Handling,Credit Card Leakage,Hospitality,"Austin, TX",No,,,,,,,,
-2010-136,"WHID 2010-136: Hotel account hacked, card info stolen",Dozens of Driskill Hotel customers' credit card information has been stolen. Hackers in Europe were able to break into the hotel's parent company's website and steal the information. There are more than 700 victims nationwide.,"http://www.kxan.com/dpp/news/hotel-account-hacked,-card-info-stolen",6/23/2010,SQL Injection,Improper Input Handling,Credit Card Leakage,Hospitality,"Austin, TX",No,,,,,,,,
-2010-137,WHID 2010-137: Persistent XSS on Twitter.com,"Twitter user 0wn3d_5ys has demonstrated a persistent cross site scripting (XSS) vulnerability on Twitter he found on June 21st using his own Twitter account (visit at your own risk) that appears to be due to a lack of input validation of the application name field when accepting new requests for Twitter applications. Visiting his account on Twitter results in a pair of classic cross site scripting alert boxes, then your browser is manipulated, finally you enter the matrix (see below), and get messages from the researcher who found the vulnerability.",http://praetorianprefect.com/archives/2010/06/persistent-xss-on-twitter-com/,6/24/2010,Cross Site Scripting (XSS),Improper Output Handling,Defacement,Web 2.0,USA,No,,,,Twitter,,,,
-2010-137,WHID 2010-137: Persistent XSS on Twitter.com,"Twitter user 0wn3d_5ys has demonstrated a persistent cross site scripting (XSS) vulnerability on Twitter he found on June 21st using his own Twitter account (visit at your own risk) that appears to be due to a lack of input validation of the application name field when accepting new requests for Twitter applications. Visiting his account on Twitter results in a pair of classic cross site scripting alert boxes, then your browser is manipulated, finally you enter the matrix (see below), and get messages from the researcher who found the vulnerability.",http://praetorianprefect.com/archives/2010/06/persistent-xss-on-twitter-com/,6/24/2010,Cross Site Scripting (XSS),Improper Output Handling,Defacement,Web 2.0,USA,No,,,,Twitter,,,,
-2010-138,WHID 2010-138: Personal data accessed on Blue Cross website,"In a written statement, Anthem Blue Cross explained how the breach occurred:
-2010-139,WHID 2010-139: Twitter XSS Vulnerability Possibly Exploited by Turkish Hackers,"Dimitris Pagkalos, one of the founders of the XSSed, a project that maintains an archive of XSS flaws and raises awareness about this type of Web vulnerability, notes that Twitter's security team promptly addressed the bug. However, he suggests the vulnerability might have been used in an earlier attack that made a rogue status reading ""Hacked By Turkish Hackers"" appear on almost one thousand Twitter profiles.",http://news.softpedia.com/news/Twitter-XSS-Vulnerability-Possibly-Exploited-by-Turkish-Hackers-145594.shtml,6/28/2010,Cross Site Scripting (XSS),Improper Output Handling,Defacement,Web 2.0,USA,No,,,Turkey,Twitter,,,,
-2010-139,WHID 2010-139: Twitter XSS Vulnerability Possibly Exploited by Turkish Hackers,"Dimitris Pagkalos, one of the founders of the XSSed, a project that maintains an archive of XSS flaws and raises awareness about this type of Web vulnerability, notes that Twitter's security team promptly addressed the bug. However, he suggests the vulnerability might have been used in an earlier attack that made a rogue status reading ""Hacked By Turkish Hackers"" appear on almost one thousand Twitter profiles.",http://news.softpedia.com/news/Twitter-XSS-Vulnerability-Possibly-Exploited-by-Turkish-Hackers-145594.shtml,6/28/2010,Cross Site Scripting (XSS),Improper Output Handling,Defacement,Web 2.0,USA,No,,,Turkey,Twitter,,,,
-2010-13,WHID 2010-13: Australian Government websites blitzed by DDoS attack,The websites of Senator Stephen Conroy and the Australian Parliament House were inaccessible this morning after the 'Anonymous' group of hackers claimed credit for a Distributed Denial of Service (DDoS) attack on Australian Government web sites.,"http://www.securecomputing.net.au/News/166860,australian-government-websites-blitzed-by-ddos-attack.aspx",2/10/2010,Denial of Service,Insufficient Anti-automation,Downtime,Politics,Australia,No,,,,,,,,
-2010-13,WHID 2010-13: Australian Government websites blitzed by DDoS attack,The websites of Senator Stephen Conroy and the Australian Parliament House were inaccessible this morning after the 'Anonymous' group of hackers claimed credit for a Distributed Denial of Service (DDoS) attack on Australian Government web sites.,"http://www.securecomputing.net.au/News/166860,australian-government-websites-blitzed-by-ddos-attack.aspx",2/10/2010,Denial of Service,Insufficient Anti-automation,Downtime,Politics,Australia,No,,,,,,,,
-2010-140,WHID 2010-140: Hackers fleece online poker players,"Police arrested 33 hackers who used a ???distribution of denial of service??? program to cheat online poker players out of 55 million won ($45,265) from last November through May.
-2010-141,WHID 2010-141: Virginia Right! Under Fire Yesterday With DDOS Attack,"Sorry for the outage yesterday between 8:00 AM and 7:00 PM. Virginia Right! was under attack with a Distributed Denial of Service. Part of the problem in resolving the issue is the fact that Virginia Right! is on a shared hosting server with many hosts using the same IP address. The first thing that has to be determined is which domain is under attack. They do this by temporarily assigning a static IP address to each site hosted on the server (as opposed to all of us sharing the same address). When they were done, everyone came back up except ??? Virginia Right!. So the attacks were specifically directed at us!",http://beforeitsnews.com/news/87/162/Virginia_Right_Under_Fire_Yesterday_With_DDOS_Attack.html,6/27/2010,Denial of Service,Insufficient Anti-automation,Downtime,Blogs,"Virginia, USA",No,,,,,,,,
-2010-141,WHID 2010-141: Virginia Right! Under Fire Yesterday With DDOS Attack,"Sorry for the outage yesterday between 8:00 AM and 7:00 PM. Virginia Right! was under attack with a Distributed Denial of Service. Part of the problem in resolving the issue is the fact that Virginia Right! is on a shared hosting server with many hosts using the same IP address. The first thing that has to be determined is which domain is under attack. They do this by temporarily assigning a static IP address to each site hosted on the server (as opposed to all of us sharing the same address). When they were done, everyone came back up except ??? Virginia Right!. So the attacks were specifically directed at us!",http://beforeitsnews.com/news/87/162/Virginia_Right_Under_Fire_Yesterday_With_DDOS_Attack.html,6/27/2010,Denial of Service,Insufficient Anti-automation,Downtime,Blogs,"Virginia, USA",No,,,,,,,,
-2010-142,"WHID 2010-142: Hackers vandalise 200 web sites, cripple 150","The web sites of more than a whopping 200 Australian organisations were hijacked and vandalised in a spate of hacks last week.
-2010-143,WHID 2010-143: Whirlpool Repeatedly Hit by DDoS Attacks,"Australian broadband news website Whirlpool.net.au was the target of several Distributed Denial of Service (DDoS) attacks this morning. The hosting provider moved quickly to mitigate, but attackers evaded the restrictions, causing an aggregated downtime of around ten hours.
-2010-144,"WHID 2010-144: Hackers Steal $465,000 from Escrow Firm","A total of $465,000 was recently stolen from California-based Village View Escrow via 26 consecutive wire transfers.
-2010-145,WHID 2010-145: Hacker tries to manipulate Maine's legislative website,"The state's online database of legislative activity has been taken offline because of an attempt by an unknown hacker to manipulate the website's coding.
-2010-146,WHID 2010-146: Hacking ring busted over test scores,"Police in Jinan, Shandong Province arrested several members of a ring that hacked into education websites to change test scores and forge credentials for cash.",http://english.people.com.cn/90001/90776/90882/7044956.html,6/29/2010,Unknown,Unknown,Disinformation,Education,China,No,,,China,,,,,
-2010-146,WHID 2010-146: Hacking ring busted over test scores,"Police in Jinan, Shandong Province arrested several members of a ring that hacked into education websites to change test scores and forge credentials for cash.",http://english.people.com.cn/90001/90776/90882/7044956.html,6/29/2010,Unknown,Unknown,Disinformation,Education,China,No,,,China,,,,,
-2010-147,"WHID 2010-147: Biggest blog company Skyblog hacked 32,000,000 accounts stolen","Earlier this week, IT staff Skyrock / Skyblog audit its servers, an old classic that can trace bugs and small technical malfunctions. Except this time, the ""bug"" seems to be much more serious. A filenamed ""hello""and some scripts are discovered on a server. Neither one, nor two, the alert is triggered. A more complete audit is implemented. It is then discovered that an intrusion has been orchestrated from a backdoor downloaded via a service misconfigured (Waka) ""Download"". From this facility, malicious, or the pirates have certainly got their hands on more than 32 million accounts skyblogueurs. It seems that the intruder will be difficult to trace. He crushed the logs after its passage. A ip appears, however, it resulted in a proxy, based in England. The drafting of ZATAZ.COM could know the exact date of the intrusion.",http://datalossdb.org/incidents/2948,5/19/2010,Misconfiguration,Application Misconfiguration,Leakage of Information,Blogs,France,No,,,,,,,,
-2010-147,"WHID 2010-147: Biggest blog company Skyblog hacked 32,000,000 accounts stolen","Earlier this week, IT staff Skyrock / Skyblog audit its servers, an old classic that can trace bugs and small technical malfunctions. Except this time, the ""bug"" seems to be much more serious. A filenamed ""hello""and some scripts are discovered on a server. Neither one, nor two, the alert is triggered. A more complete audit is implemented. It is then discovered that an intrusion has been orchestrated from a backdoor downloaded via a service misconfigured (Waka) ""Download"". From this facility, malicious, or the pirates have certainly got their hands on more than 32 million accounts skyblogueurs. It seems that the intruder will be difficult to trace. He crushed the logs after its passage. A ip appears, however, it resulted in a proxy, based in England. The drafting of ZATAZ.COM could know the exact date of the intrusion.",http://datalossdb.org/incidents/2948,5/19/2010,Misconfiguration,Application Misconfiguration,Leakage of Information,Blogs,France,No,,,,,,,,
-2010-148,WHID 2010-148: AsSeenOnTV SQL injection into corporate web server exposed credit card information of customers,AsSeenOnTV website hacked via SQL Injection and planted malware.,http://datalossdb.org/incidents/2953,6/29/2010,SQL Injection,Improper Input Handling,Planting of Malware,Retail,USA,No,,,,,,,,
-2010-148,WHID 2010-148: AsSeenOnTV SQL injection into corporate web server exposed credit card information of customers,AsSeenOnTV website hacked via SQL Injection and planted malware.,http://datalossdb.org/incidents/2953,6/29/2010,SQL Injection,Improper Input Handling,Planting of Malware,Retail,USA,No,,,,,,,,
-2010-149,WHID 2010-149: Identity Stolen Through X-Box Live,"Rosalinda Gonzalez's bought the X-Box 360 console for her sons. They enjoy playing the video games and using the live service where they can connect with players from around the world.
-2010-14,WHID 2010-14: Dismantling of Saudi-CIA Web site illustrates need for clearer cyberwar policies,"A very interesting cyberwarfare story involving US government/military on both sides. By early 2008, top U.S. military officials had become convinced that extremists planning attacks on American forces in Iraq were making use of a Web site set up by the Saudi government and the CIA to uncover terrorist plots in the kingdom. Elite U.S. military computer specialists, over the objections of the CIA, mounted a cyberattack that dismantled the online forum.",http://www.washingtonpost.com/wp-dyn/content/article/2010/03/18/AR2010031805464.html,3/19/2010,Denial of Service,Insufficient Anti-automation,Downtime,Government,Saudi Arabia,No,,,USA,,,,,
-2010-14,WHID 2010-14: Dismantling of Saudi-CIA Web site illustrates need for clearer cyberwar policies,"A very interesting cyberwarfare story involving US government/military on both sides. By early 2008, top U.S. military officials had become convinced that extremists planning attacks on American forces in Iraq were making use of a Web site set up by the Saudi government and the CIA to uncover terrorist plots in the kingdom. Elite U.S. military computer specialists, over the objections of the CIA, mounted a cyberattack that dismantled the online forum.",http://www.washingtonpost.com/wp-dyn/content/article/2010/03/18/AR2010031805464.html,3/19/2010,Denial of Service,Insufficient Anti-automation,Downtime,Government,Saudi Arabia,No,,,USA,,,,,
-2010-150,WHID 2010-150: At least four Armenian websites were attacked by Azerbaijani hackers,"At least four Armenian websites were attacked by Azerbaijani hackers during a week.
-2010-151,WHID 2010-151: YouTube Hacked,"Today, members of the Internet communities 4chan and other enterprising computer whizzes hacked YouTube using a vulnerability in the site???s comment system. While the hack was used on a variety of videos, striking music videos featuring teen pop idol Justin Bieber was the most popular activity.
-2010-152,WHID 2010-152: The Pirate Bay hacked,"According to an advisory posted on the web site of Argentinian group of security researchers, they were able to obtain access to the Pirate Bay???s administration panel, by discovering multiple SQL injections, leading to the exposure of emails, MD5 hashes for passwords, and the IP address for any particular Pirate Bay user.",http://krebsonsecurity.com/2010/07/pirate-bay-hack-exposes-user-booty/,7/5/2010,SQL Injection,Improper Input Handling,Disclosure Only,Internet,Sweden,No,,,Argentina,,,,,http://insilence.biz/2010/07/multiple-sql-injections-on-the-pirate-bay/
-2010-152,WHID 2010-152: The Pirate Bay hacked,"According to an advisory posted on the web site of Argentinian group of security researchers, they were able to obtain access to the Pirate Bay???s administration panel, by discovering multiple SQL injections, leading to the exposure of emails, MD5 hashes for passwords, and the IP address for any particular Pirate Bay user.",http://krebsonsecurity.com/2010/07/pirate-bay-hack-exposes-user-booty/,7/5/2010,SQL Injection,Improper Input Handling,Disclosure Only,Internet,Sweden,No,,,Argentina,,,,,http://insilence.biz/2010/07/multiple-sql-injections-on-the-pirate-bay/
-2010-153,"WHID 2010-153: App Store, Hacked.",This article began with details of one specific app developer hacking iTunes users accounts and purchasing their own apps using those accounts ??? making it to the top of the iTunes charts. As the story has developed it appears to be far more widespread than just that one particular developer and his apps??_the Apple App store is filled with App Farms being used to steal. We???ve put together a complete list of all the facts and updates to this story here which we high recommend you read instead of this article. Apple has also now released a statement about the matter.,http://thenextweb.com/apple/2010/07/04/app-store-hacked/,7/4/2010,Stolen Credentials,Insufficient Authentication,Monetary Loss,Retail,USA,No,,,,,,,,
-2010-153,"WHID 2010-153: App Store, Hacked.",This article began with details of one specific app developer hacking iTunes users accounts and purchasing their own apps using those accounts ??? making it to the top of the iTunes charts. As the story has developed it appears to be far more widespread than just that one particular developer and his apps??_the Apple App store is filled with App Farms being used to steal. We???ve put together a complete list of all the facts and updates to this story here which we high recommend you read instead of this article. Apple has also now released a statement about the matter.,http://thenextweb.com/apple/2010/07/04/app-store-hacked/,7/4/2010,Stolen Credentials,Insufficient Authentication,Monetary Loss,Retail,USA,No,,,,,,,,
-2010-154,WHID 2010-154: Justin Bieber My World Tour Contest Hacked,"That was but a preliminary skirmish ??? they???ve come up with a much more damaging plan ??? to send Bieber to North Korea. Foolish, foolish Bieber has started a competition for countries to vote for him to come and tour them. Called the Justin Bieber My World Tour Contest, it has now been thoroughly highjacked by Anonymous ??? at the time of writing, North Korea is in second place by only a few thousand votes. Unless the current leader Israel can get its act together, it should be overtaken by lunchtime.",http://blogs.independent.co.uk/2010/07/02/the-plot-to-send-justin-bieber-to-north-korea/,7/2/2010,Process Automation,Insufficient Anti-automation,Disinformation,Entertainment,USA,No,,,,,,,,
-2010-154,WHID 2010-154: Justin Bieber My World Tour Contest Hacked,"That was but a preliminary skirmish ??? they???ve come up with a much more damaging plan ??? to send Bieber to North Korea. Foolish, foolish Bieber has started a competition for countries to vote for him to come and tour them. Called the Justin Bieber My World Tour Contest, it has now been thoroughly highjacked by Anonymous ??? at the time of writing, North Korea is in second place by only a few thousand votes. Unless the current leader Israel can get its act together, it should be overtaken by lunchtime.",http://blogs.independent.co.uk/2010/07/02/the-plot-to-send-justin-bieber-to-north-korea/,7/2/2010,Process Automation,Insufficient Anti-automation,Disinformation,Entertainment,USA,No,,,,,,,,
-2010-155,WHID 2010-155: S. Korean Gov't Websites Hit by Hacker Attacks,"Official websites of South Korean government agencies, including the presidential office and the foreign ministry, came under hacker attacks Wednesday, a national telecom regulator said.
-2010-156,WHID 2010-156: The Russian Railways tickets site was hacked,"Unknown attackers hack the official site of ""Russian Railways"" company. As a result, web pages were replaced by hackers??? messages. The site was temporary blocked; now it is resumed but some pages are still unavailable, ""Buying Train Tickets"" web page is among them (ticket.rzd.ru). No details about personal data leakage is now available.",http://www.uinc.ru/news/sn14165.html,7/21/2010,Unknown,Misconfiguration,Defacement,Transport,Russia,No,,,,,,,,
-2010-156,WHID 2010-156: The Russian Railways tickets site was hacked,"Unknown attackers hack the official site of ""Russian Railways"" company. As a result, web pages were replaced by hackers??? messages. The site was temporary blocked; now it is resumed but some pages are still unavailable, ""Buying Train Tickets"" web page is among them (ticket.rzd.ru). No details about personal data leakage is now available.",http://www.uinc.ru/news/sn14165.html,7/21/2010,Unknown,Misconfiguration,Defacement,Transport,Russia,No,,,,,,,,
-2010-157,WHID 2010-157: Facebook Full Disclosure,apps.facebook.com website hacked via SQL Injection.,"http://sla.ckers.org/forum/read.php?16,35138,35138#msg-35138",7/20/2010,SQL Injection,Information Leakage,Disclosure Only,Internet,,No,,,,,,,,http://devteev.blogspot.com/2010/07/facebook-full-disclosure.html
-2010-157,WHID 2010-157: Facebook Full Disclosure,apps.facebook.com website hacked via SQL Injection.,"http://sla.ckers.org/forum/read.php?16,35138,35138#msg-35138",7/20/2010,SQL Injection,Information Leakage,Disclosure Only,Internet,,No,,,,,,,,http://devteev.blogspot.com/2010/07/facebook-full-disclosure.html
-2010-158,WHID 2010-158: National Space Agency of the Republic of Kazakhstan was hacked,"On the 18th of July the hack-world.org group using an SQL Injection attack obtained access to the administration section of the National Space Agency of the Republic of Kazakhstan. Obtaining access to the administration system of the site was facilitated by the fact that administrators used weak passwords that allowed local recovery using MD5 hash. Currently, the site is under reconstruction.",http://habrahabr.ru/blogs/infosecurity/99736/,7/18/2010,SQL Injection,Improper Input Handling,Leakage of Information,Government,Kazahtan,No,,,Russia,,,,,http://hack-world.org/showthread.php?t=5133
-2010-158,WHID 2010-158: National Space Agency of the Republic of Kazakhstan was hacked,"On the 18th of July the hack-world.org group using an SQL Injection attack obtained access to the administration section of the National Space Agency of the Republic of Kazakhstan. Obtaining access to the administration system of the site was facilitated by the fact that administrators used weak passwords that allowed local recovery using MD5 hash. Currently, the site is under reconstruction.",http://habrahabr.ru/blogs/infosecurity/99736/,7/18/2010,SQL Injection,Improper Input Handling,Leakage of Information,Government,Kazahtan,No,,,Russia,,,,,http://hack-world.org/showthread.php?t=5133
-2010-159,"WHID 2010-159: 500 000 websites hacked, including Apple","As reported by The Register IT news portal, a number of smaller websites have been hacked using an SQL injection attack method that attempts to obfuscate links to malware infected pages. The hack apparently also affected two Apple websites that are used to promote its iTunes podcasts.
-2010-15,WHID 2010-15: Villar website 'hacked',"The rivalry between Senators Manny Villar and Benigno ""Noynoy"" Aquino has gone beyond the campaign trail as the official website of the Nacionalista Party presidential bet supposedly got hacked by an Aquino supporter Monday. At about 10 a.m., Villar's official website www.mannyvillar.co.ph contained a blog entry titled ""Hacked by Kris Aquino."" The entry, which was written in ""swardspeak"", took jabs at Villar's marketing strategy and ended up coaxing its readers to vote for Aquino instead.",http://www.abs-cbnnews.com/lifestyle/03/22/10/villar-website-hacked,3/19/2010,Unknown,Improper Output Handling,Defacement,Politics,Phillipines,No,,,Phillipines,,,,,
-2010-15,WHID 2010-15: Villar website 'hacked',"The rivalry between Senators Manny Villar and Benigno ""Noynoy"" Aquino has gone beyond the campaign trail as the official website of the Nacionalista Party presidential bet supposedly got hacked by an Aquino supporter Monday. At about 10 a.m., Villar's official website www.mannyvillar.co.ph contained a blog entry titled ""Hacked by Kris Aquino."" The entry, which was written in ""swardspeak"", took jabs at Villar's marketing strategy and ended up coaxing its readers to vote for Aquino instead.",http://www.abs-cbnnews.com/lifestyle/03/22/10/villar-website-hacked,3/19/2010,Unknown,Improper Output Handling,Defacement,Politics,Phillipines,No,,,Phillipines,,,,,
-2010-160,WHID 2010-160: Hackers crack e-mail server of Russian Federal Protection Service (gov.ru),"Email server of one of Federal Protection Service (FPS) departments was attacked. As a result, for several hours every Internet user was allowed to access FPS e-mail archive.
-2010-161,WHID 2010-161: IBC Bank Online Banking Website is Down or Under DDoS Attack?,There has been a lot of online banking website or internet-based banking experiencing a downtime for various reason these past few weeks. Last week we reported that the Bank of America website crashes down for at least 4 hours and now the IBC bank. Both the IBC Bank website (IBC.com) and the IBC Bank Online login site (ibcbankonline.ibc.com) are down currently.,http://www.adi-news.com/ibc-bank-online-banking-website-is-down-or-under-ddos-attack/24357/,9/2/2010,Denial of Service,Insufficient Anti-automation,Downtime,Finance,"Texas, USA",No,,,,,,,,
-2010-161,WHID 2010-161: IBC Bank Online Banking Website is Down or Under DDoS Attack?,There has been a lot of online banking website or internet-based banking experiencing a downtime for various reason these past few weeks. Last week we reported that the Bank of America website crashes down for at least 4 hours and now the IBC bank. Both the IBC Bank website (IBC.com) and the IBC Bank Online login site (ibcbankonline.ibc.com) are down currently.,http://www.adi-news.com/ibc-bank-online-banking-website-is-down-or-under-ddos-attack/24357/,9/2/2010,Denial of Service,Insufficient Anti-automation,Downtime,Finance,"Texas, USA",No,,,,,,,,
-2010-162,WHID 2010-162: Dick's says poll was hacked,"The poll to influence where a new Dick's Drive-In location will be built has been so popular, a hacker found a way to electronically stuff the ballot box.
-2010-163,WHID 2010-163: Ironman websites targeted by cyberattack,"According to a press release today from Ironman.com, the site was a victim of a Distributed Denial-of-Service (DDoS) attack.",http://www.examiner.com/triathlon-in-national/ironman-websites-targeted-by-cyberattack?render=print#print,8/31/2010,Denial of Service,Insufficient Anti-automation,Downtime,Sports,,No,,,,,,,,
-2010-163,WHID 2010-163: Ironman websites targeted by cyberattack,"According to a press release today from Ironman.com, the site was a victim of a Distributed Denial-of-Service (DDoS) attack.",http://www.examiner.com/triathlon-in-national/ironman-websites-targeted-by-cyberattack?render=print#print,8/31/2010,Denial of Service,Insufficient Anti-automation,Downtime,Sports,,No,,,,,,,,
-2010-164,WHID 2010-164: Company Paid to Launch DoS Attacks Against Torrent Sites,An Indian company paid by the film industry to get copyrighted works removed from the Internet openly admits to launching Denial of Service (DoS) attacks against torrent sites that refuse to comply with takedown notices.,http://news.softpedia.com/news/Company-Paid-to-Launch-DoS-Attacks-Against-Torrent-Sites-155892.shtml,9/10/2010,Denial of Service,Insufficient Anti-automation,Downtime,Entertainment,,No,,,India,,,,,
-2010-164,WHID 2010-164: Company Paid to Launch DoS Attacks Against Torrent Sites,An Indian company paid by the film industry to get copyrighted works removed from the Internet openly admits to launching Denial of Service (DoS) attacks against torrent sites that refuse to comply with takedown notices.,http://news.softpedia.com/news/Company-Paid-to-Launch-DoS-Attacks-Against-Torrent-Sites-155892.shtml,9/10/2010,Denial of Service,Insufficient Anti-automation,Downtime,Entertainment,,No,,,India,,,,,
-2010-165,WHID 2010-165: FMT under DDOS attack,"The FreeMalaysiaToday website has come under attack, rendering the news portal inaccessible to readers since 3am this morning.
-2010-166,WHID 2010-166: Twitter Patches Account Hijacking Vulnerability,"Twitter users faced a virulent new JavaScript-based account hijacking attack on Monday. Simply clicking on one of the malicious links involved, disguised as innocuous-looking links in Tweets, enabled attackers to hijack a user's account and post numerous Tweets.",http://www.informationweek.com/news/security/vulnerabilities/showArticle.jhtml?articleID=227300371&cid=RSSfeed_IWK_News,9/8/2010,Cross Site Scripting (XSS),Improper Output Handling,Session Hijacking,Web 2.0,USA,No,,,Brazil,Twitter,,,,
-2010-166,WHID 2010-166: Twitter Patches Account Hijacking Vulnerability,"Twitter users faced a virulent new JavaScript-based account hijacking attack on Monday. Simply clicking on one of the malicious links involved, disguised as innocuous-looking links in Tweets, enabled attackers to hijack a user's account and post numerous Tweets.",http://www.informationweek.com/news/security/vulnerabilities/showArticle.jhtml?articleID=227300371&cid=RSSfeed_IWK_News,9/8/2010,Cross Site Scripting (XSS),Improper Output Handling,Session Hijacking,Web 2.0,USA,No,,,Brazil,Twitter,,,,
-2010-167,"WHID 2010-167: Facebook closes hole that let spammers auto-post to walls, friends","acebook has closed a hole that was being used by spammers to automatically post wall messages and direct messages to friends, the company said on Tuesday.
-2010-168,"WHID 2010-168: Symantec secures its vulnerable ""Hack is Wack"" site","Security giant Symantec said it has secured its ???Hack is Wack??? contest website after researchers discovered it was riddled with vulnerabilities.
-2010-169,WHID 2010-169: TechCrunch Europe hacked to spread malware like a poison ivy infection,"Graham Cluley, Senior Technology Consultant at Sophos, blogged, ""A closer examination of TechCrunch Europe's site reveals that the offending code - which uses a malicious iFrame - is found in a JavaScript file, used by the site as part of its WordPress infrastructure. This attempts to serve up a malicious PDF file, exploiting a vulnerability that brings to your computer a nasty infection from the ZBot (also known as Zeus) malware family.""",http://blogs.computerworld.com/16888/techcrunch_europe_hacked_to_spread_malware_like_a_poison_ivy_infection,9/7/2010,Misconfiguration,Application Misconfiguration,Planting of Malware,Media,Europe,No,,,,WordPress,,,,
-2010-169,WHID 2010-169: TechCrunch Europe hacked to spread malware like a poison ivy infection,"Graham Cluley, Senior Technology Consultant at Sophos, blogged, ""A closer examination of TechCrunch Europe's site reveals that the offending code - which uses a malicious iFrame - is found in a JavaScript file, used by the site as part of its WordPress infrastructure. This attempts to serve up a malicious PDF file, exploiting a vulnerability that brings to your computer a nasty infection from the ZBot (also known as Zeus) malware family.""",http://blogs.computerworld.com/16888/techcrunch_europe_hacked_to_spread_malware_like_a_poison_ivy_infection,9/7/2010,Misconfiguration,Application Misconfiguration,Planting of Malware,Media,Europe,No,,,,WordPress,,,,
-2010-16,"WHID 2010-16: The Game's Email Hacked, Monthly Expenses List Leaked","Hackers don't discriminate. The biggest targets these days seem to be celebrities. The latest is rapper The Game, whose GMAIL account was reportedly hacked into recently. According to TheBoomBox.com, the rapper didn't have too many interesting things going on in his email. At least, nothing revealed just yet.
-2010-170,WHID 2010-170: OpenX Vulnerability Exploited to Compromise Multiple Ad Servers,"A vulnerability in a component of the OpenX advertising platform has been exploited by hackers to tamper with ad serving on multiple websites including The Pirate Bay, eSarcasm and AfterDawn.
-2010-171,WHID 2010-171: Hackers Push Malicious Ads onto UK Celebrity Gossip Website,"The Popbitch celebrity gossip website was blacklisted by Google after hackers managed to compromise its ad server and push malware to users. A Popbitch spokesperson has since confirmed that the website served malicious ads for a limited period of time after its ad server was compromised by hackers.
-2010-172,WHID 2010-172: Cipro steps up security after hacking,"The Companies and Intellectual Property Registration Office (Cipro) said on Thursday it beefed up internal security to make sure directors cannot be removed from companies without the proper processes being followed.
-2010-173,WHID 2010-173: Polish hacker gets inside US Military's Defence Logistic Agency website,"There is one movie every Polish person knows. It's a cult comedy from the 80s called ""Mi??"" - meaning ""Teddy Bear"". Now, thanks to a hacker going by a name ""Porkythepig"", everyone can see it - but not on YouTube where you would expect it, but on the USA military Defence Logistics Agency website.
-2010-174,WHID 2010-174: GOP lawmaker: My Twitter account was 'hacked by robospammers',"Rep. John Culberson (R-Texas) returned to Twitter after nearly a five-month break Tuesday night only to have his account hacked.
-2010-175,WHID 2010-175: Persistent XSS Bug on Twitter Being Exploited,"There is currently a persistent cross-site scripting vulnerability on the main Twitter site and researchers say that the bug is being exploited via proof-of-concept code.
-2010-176,WHID 2010-176: Cyber rally disrupts US recording industry website,"Reference WHID 2010-164: Company Paid to Launch DoS Attacks Against Torrent Sites
-2010-177,WHID 2010-177: Japan Suspects Chinese Hackers Attacked Its Official Websites,"Japan views Chinese hackers as main suspects for Distributed Denial of Service (DDoS) attacks that affected several of its official websites last week.
-2010-178,WHID 2010-178: New Mass Injection Attack Targets ASP Websites,"A gang of hackers targeting infecting predominantly ASP and ASP.NET websites with malicious code, has launched a new attack that so far affected at least 1,500 domains. ""A large number of sites have been hacked again in the last few days with a malware script pointing to google-stat50.info (and google-stats50.info),"" David Dede of Web integrity monitoring vendor Sucuri Security, warns. ""Not only small sites, but some big ones got hit as well. It is the same SQL injection attack as used in the robint-us mass infection of a few months ago,"" he adds. The robint.us mass injection took place at the beginning of June and got a good coverage in the media because it affected the websites of the Wall Street Journal and Jerusalem Post.",http://news.softpedia.com/news/New-Mass-Injection-Attack-Targets-ASP-Websites-158499.shtml,9/29/2010,SQL Injection,Improper Input Handling,Planting of Malware,Multiple,,Yes,Mass SQL Injection Bots,,,,,,,
-2010-178,WHID 2010-178: New Mass Injection Attack Targets ASP Websites,"A gang of hackers targeting infecting predominantly ASP and ASP.NET websites with malicious code, has launched a new attack that so far affected at least 1,500 domains. ""A large number of sites have been hacked again in the last few days with a malware script pointing to google-stat50.info (and google-stats50.info),"" David Dede of Web integrity monitoring vendor Sucuri Security, warns. ""Not only small sites, but some big ones got hit as well. It is the same SQL injection attack as used in the robint-us mass infection of a few months ago,"" he adds. The robint.us mass injection took place at the beginning of June and got a good coverage in the media because it affected the websites of the Wall Street Journal and Jerusalem Post.",http://news.softpedia.com/news/New-Mass-Injection-Attack-Targets-ASP-Websites-158499.shtml,9/29/2010,SQL Injection,Improper Input Handling,Planting of Malware,Multiple,,Yes,Mass SQL Injection Bots,,,,,,,
-2010-179,WHID 2010-179: WTF worm makes Twitterers declare goat lust,"Another malicious worm hit Twitter over the weekend, days after the micro-blogging site reached near-meltdown from a technically similar attack.
-2010-17,WHID 2010-17: Govt websites hacked,"Bangladesh government websites, operating out of the Prime Minister's Office, were attacked on Saturday by hackers purporting to be ""Indian"" .
-2010-180,WHID 2010-180: Thousands of Websites Affected by Anonymous DDoS Attack Against AFACT,"The Distributed Denial of Service (DDoS) attack launched by Anonymous against the Australian Federation Against Copyright Theft (AFACT) yesterday, has ended up affecting almost 8,000 unrelated websites.
-2010-181,WHID 2010-181: Mass cyber attack paralyses Burmese media,"Websites belonging to The Irrawaddy magazine, Mizzima and DVB ??? all exiled media groups founded by former activists ??? were today attacked using DDoS, or distributed denial-of-service, which fires thousands of malformed web connections against the site.",http://www.dvb.no/elections/mass-cyber-attack-paralyses-burmese-media/11932,9/27/2010,Denial of Service,Insufficient Anti-automation,Downtime,Media,Burma,No,,,,,,,,
-2010-181,WHID 2010-181: Mass cyber attack paralyses Burmese media,"Websites belonging to The Irrawaddy magazine, Mizzima and DVB ??? all exiled media groups founded by former activists ??? were today attacked using DDoS, or distributed denial-of-service, which fires thousands of malformed web connections against the site.",http://www.dvb.no/elections/mass-cyber-attack-paralyses-burmese-media/11932,9/27/2010,Denial of Service,Insufficient Anti-automation,Downtime,Media,Burma,No,,,,,,,,
-2010-182,WHID 2010-182: Orkut Hit by XSS Worm,"First Twitter was hacked. Then Facebook went down. Now it???s Orkut???s turn. Google???s social networking site has been attacked by the virulent ???Bom Sabado??? worm. Bom Sabado means ???Good Saturday??? in Portuguese, the native language of Brazil where the worm is thought to have originated. Orkut is the most popular social site in Brazil, India and several other countries.
-2010-183,"WHID 2010-183: Don't blame DNS for Facebook outage, experts say","Facebook gave little detail about the cause of the outage except to say that it was the result of a misconfiguration in one of its databases, which prompted a flood of traffic from an automated system trying to fix the error.
-2010-184,WHID 2010-184: Microsoft warns of in-the-wild attacks on web app flaw,"Attackers have begun exploiting a recently disclosed vulnerability in Microsoft web-development applications that opens password files and other sensitive data to interception and tampering. The vulnerability in the way ASP.Net apps encrypt data was disclosed last week at the Ekoparty Conference in Argentina. Microsoft on Friday issued a temporary fix for the so-called ???cryptographic padding attack,??? which allows attackers to decrypt protected files by sending vulnerable systems large numbers of corrupted requests. Now, Microsoft security pros say they are seeing ???limited attacks??? in the wild and warned that they can be used to read and tamper with a system's most sensitive configuration files.",http://www.theregister.co.uk/2010/09/21/asp_dot_net_padding_oracle_fix/,9/21/2010,Brute Force,Information Leakage,Leakage of Information,Multiple,,No,,,,,,,,
-2010-184,WHID 2010-184: Microsoft warns of in-the-wild attacks on web app flaw,"Attackers have begun exploiting a recently disclosed vulnerability in Microsoft web-development applications that opens password files and other sensitive data to interception and tampering. The vulnerability in the way ASP.Net apps encrypt data was disclosed last week at the Ekoparty Conference in Argentina. Microsoft on Friday issued a temporary fix for the so-called ???cryptographic padding attack,??? which allows attackers to decrypt protected files by sending vulnerable systems large numbers of corrupted requests. Now, Microsoft security pros say they are seeing ???limited attacks??? in the wild and warned that they can be used to read and tamper with a system's most sensitive configuration files.",http://www.theregister.co.uk/2010/09/21/asp_dot_net_padding_oracle_fix/,9/21/2010,Brute Force,Information Leakage,Leakage of Information,Multiple,,No,,,,,,,,
-2010-185,WHID 2010-185: Online hackers steal $600K from city of Brigantine's bank account,"Computer hackers managed to steal $600,000 from a New Jersey shore town's bank account.
-2010-186,WHID 2010-186: Foursquare Hacked by TechCrunch Editor Michael Arrington,"Becoming ""mayor"" of a location is the most coveted status in Foursquare. To win this honor you have to check in to a location more than anyone else, and to do that you actually have to go there, since Foursquare won't let you check in remotely. But last night Techcrunch editor Michael Arrington punked Foursquare's API and made himself mayor of Facebook and Twitter headquarters, all without ever leaving his office.
-2010-187,"WHID 2010-187: ""Operation Payback"" attacks to go on until ""we stop being angry""","The distributed denial of service (DDoS) attacks against anti-piracy websites have gone on for a week now, with the lawyers behind the ""US Copyright Group"" being the latest target. And the anonymous Internet users behind ""Operation Payback"" aren't done acting out; in an interview yesterday with the security experts at Panda Labs, one of the organizers said that Anonymous' attacks will continue ""until we stop being angry."" Judging from the list of things that make him (?) angry, this could take a while.
-2010-188,WHID 2010-188: Hackers hijack internet voting system in Washington DC,"The voting application was written on the Ruby on Rails framework and ran on top of the Apache web server and the MySQL database. The scientists were able to hijack the system after they discovered that they could upload ballots with almost any string they wanted. By inserting Unix commands into the file names, they were able to take ???almost total control of the server software, including the ability to change votes and reveal voters' secret ballots,??? Halderman said.
-2010-189,WHID 2010-189: Copyright holder floored by DDoS flood,"Spain's copyright society (SGAE) came under attack by hacktivists from Anonymous on Thursday as part of the latest phase of a high-profile campaign against organisations that hassle file-sharers.
-2010-18,WHID 2010-18: Hackers crash Aussie charity websites,"The internet services of two Australian autism support organisations have been crashed by computer hackers and a third may also have fallen victim, raising fears of a targeted attack to coincide with autism month.
-2010-190,WHID 2010-190: PayPal and eBay XSSed Again,"New cross-site scripting (XSS) vulnerabilities, that can be leveraged to create very credible phishing attacks, have been identified on PayPal and eBay.
-2010-191,WHID 2010-191: XSS Flaw Found on Secure American Express Site,"A cross-site scripting (XSS) vulnerability has been identified on an American Express website secured with EV SSL and can be exploited to enhance phishing attacks.
-2010-192,"WHID 2010-192: SQL Injection Used to Deface Copyprotected, Others Might Follow","However, Sean-Paul Correll of Panda Security, doesn't agree with the ""DNS cache poisoning"" theory. According to him, the attack vector was SQL injection.
-2010-193,WHID 2010-193: IPO.gov.uk - Less than an Hour Until Attack Begins,"So now the target of Anonymous is the IPO.gov.uk website - or the Intellectual Property Office. This is the first time Anonymous has targeted a government website, indicating a level of fearlessness considering the possible ramifications. As its name suggests, the IPO governs and helps protect copyrights and intellectual property in the United Kingdom.",http://www.slyck.com/story2087_IPOgovuk_Less_than_an_Hour_Until_Attack_Begins,10/16/2010,Denial of Service,Insufficient Anti-automation,Downtime,Government,UK,Yes,Operation Payback,,,,,,,
-2010-193,WHID 2010-193: IPO.gov.uk - Less than an Hour Until Attack Begins,"So now the target of Anonymous is the IPO.gov.uk website - or the Intellectual Property Office. This is the first time Anonymous has targeted a government website, indicating a level of fearlessness considering the possible ramifications. As its name suggests, the IPO governs and helps protect copyrights and intellectual property in the United Kingdom.",http://www.slyck.com/story2087_IPOgovuk_Less_than_an_Hour_Until_Attack_Begins,10/16/2010,Denial of Service,Insufficient Anti-automation,Downtime,Government,UK,Yes,Operation Payback,,,,,,,
-2010-194,WHID 2010-194: Liberal Democrats website hijacked by tuition fees message,"The website for the Liberal Democrats was hacked at the end of last week, with the front page redirecting to a YouTube protest about tuition fees.",http://www.scmagazineuk.com/liberal-democrats-website-hijacked-by-tuition-fees-message/article/181149/,10/18/2010,Unknown,Unknown,Defacement,Politics,UK,No,,,,,,,,
-2010-194,WHID 2010-194: Liberal Democrats website hijacked by tuition fees message,"The website for the Liberal Democrats was hacked at the end of last week, with the front page redirecting to a YouTube protest about tuition fees.",http://www.scmagazineuk.com/liberal-democrats-website-hijacked-by-tuition-fees-message/article/181149/,10/18/2010,Unknown,Unknown,Defacement,Politics,UK,No,,,,,,,,
-2010-195,WHID 2010-195: Anonymous DDoS on Gene Simmons' websites,"Gene Simmons, frontman of the band KISS, is hardly impressed with the DDoS (Distributed Denial of Service) attack on GeneSimmons.com - and indirectly - SimmonsRecords.com. In fact, according to a news post made to his site yesterday, Gene is threatening legal action against the perpetrators, along with posting their names and pictures online.",http://www.slyck.com/story2088_Gene_Simmons_Directly_Threatens_Anonymous_With_Legal_Action_Jail_Time,10/12/2010,Denial of Service,Insufficient Anti-automation,Downtime,Media,"Beverly Hills, CA",Yes,Operation Payback,,,,,,,
-2010-195,WHID 2010-195: Anonymous DDoS on Gene Simmons' websites,"Gene Simmons, frontman of the band KISS, is hardly impressed with the DDoS (Distributed Denial of Service) attack on GeneSimmons.com - and indirectly - SimmonsRecords.com. In fact, according to a news post made to his site yesterday, Gene is threatening legal action against the perpetrators, along with posting their names and pictures online.",http://www.slyck.com/story2088_Gene_Simmons_Directly_Threatens_Anonymous_With_Legal_Action_Jail_Time,10/12/2010,Denial of Service,Insufficient Anti-automation,Downtime,Media,"Beverly Hills, CA",Yes,Operation Payback,,,,,,,
-2010-196,WHID 2010-196: HK star Dicky Cheung's blog hacked,"Even when the hoax was exposed, the hacker continued to boldly state in a post that he hacked Cheung's blog to test his skills.
-2010-197,WHID 2010-197: AmeriCorps Security Breach,"In order for personal data to have been exposed, someone would have had to manipulate the website address -- or know the individual's unique log-in name and use a certain technique to bypass password requirements, the letter said. The records may have shown names, addresses and social security numbers.",http://wiredworkplace.nextgov.com/2010/10/americorps_workers_personal_data_jeopardized-print.php,10/8/2010,Predictable Resource Location,Insufficient Authentication,Leakage of Information,Government,"Washington, DC",No,,,,,,,,
-2010-197,WHID 2010-197: AmeriCorps Security Breach,"In order for personal data to have been exposed, someone would have had to manipulate the website address -- or know the individual's unique log-in name and use a certain technique to bypass password requirements, the letter said. The records may have shown names, addresses and social security numbers.",http://wiredworkplace.nextgov.com/2010/10/americorps_workers_personal_data_jeopardized-print.php,10/8/2010,Predictable Resource Location,Insufficient Authentication,Leakage of Information,Government,"Washington, DC",No,,,,,,,,
-2010-198,"WHID 2010-198: Kaspersky download site hacked, redirecting users to fake AV","According to ITPro, the incident was first denied, then confirmed by Kaspersky. They say that they took the server offline as soon as they found out about the breach, that the compromise was caused by a vulnerability in a third party application for website administration and that customer details contained on company servers were not compromised.",http://www.net-security.org/malware_news.php?id=1499,10/17/2010,Known Vulnerability,Misconfiguration,Planting of Malware,Technology,"Moscow, Russia",No,,,,,,,,
-2010-198,"WHID 2010-198: Kaspersky download site hacked, redirecting users to fake AV","According to ITPro, the incident was first denied, then confirmed by Kaspersky. They say that they took the server offline as soon as they found out about the breach, that the compromise was caused by a vulnerability in a third party application for website administration and that customer details contained on company servers were not compromised.",http://www.net-security.org/malware_news.php?id=1499,10/17/2010,Known Vulnerability,Misconfiguration,Planting of Malware,Technology,"Moscow, Russia",No,,,,,,,,
-2010-199,WHID 2010-199: Cyber Attack Strikes FreedomWorks,"A mysterious cyber attack apparently struck the computer servers at the pro-tea party group FreedomWorks this morning, just as it launched a major fund-raising drive.
-2010-19,WHID 2010-19: Hacked personal data originating from China,"According to police, Chinese hackers have been targeting Web sites of Korean department stores and other frequently visited sites. The hackers offer the Korean information for sale on the Internet. Last September, a used-car trading Web site and the Internet home page for a car navigation manufacturer were victims of Chinese hackers who stole names and residential registration numbers of 910,000 online members. Hackers can use the stolen registration numbers to become members of certain Web sites that send spam messages, or sell the numbers to other hackers.",http://joongangdaily.joins.com/article/view.asp?aid=2918142,3/22/2010,Unknown,Unknown,Leakage of Information,Retail,Korea,No,,,,,,,,
-2010-19,WHID 2010-19: Hacked personal data originating from China,"According to police, Chinese hackers have been targeting Web sites of Korean department stores and other frequently visited sites. The hackers offer the Korean information for sale on the Internet. Last September, a used-car trading Web site and the Internet home page for a car navigation manufacturer were victims of Chinese hackers who stole names and residential registration numbers of 910,000 online members. Hackers can use the stolen registration numbers to become members of certain Web sites that send spam messages, or sell the numbers to other hackers.",http://joongangdaily.joins.com/article/view.asp?aid=2918142,3/22/2010,Unknown,Unknown,Leakage of Information,Retail,Korea,No,,,,,,,,
-2010-1,"WHID 2010-1: Hacker Breaks Into 49 House Sites, Insults Obama","A hacker broke into 49 House Web sites of both political parties after President Obama's State of the Union address. The websites were all managed by a private vendor -- GovTrends of Alexandria, Va. The article mentions that ""GovTrends let its guard down while performing an update, allowing the hacker to penetrate sites of individual members and committees overnight"" which leads to WHID's Misconfiguration Attack Method designation.
-2010-200,WHID 2010-200: Wikileaks Communications Infrastructure Attacked?,"According to sources in the hacking circuit familiar with the goings-on of Wikileaks, the organization is adopting a new server cluster to replace those that have come under the denial-of-service attack. The security breaches were not connected to the site restructuring that has brought it down for about two weeks, said a Wikileaks volunteer. Because the organization's staff members operate on the policy of ""security through obscurity,"" insiders were not clear about the magnitude of or the parties behind the attack.",http://cybersecurityreport.nextgov.com/2010/10/wikileaks_communications_infrastructure_attacked.php?oref=latest_posts,10/21/2010,Denial of Service,Insufficient Anti-automation,Downtime,News,"San Mateo, CA",No,,,,,,,,
-2010-200,WHID 2010-200: Wikileaks Communications Infrastructure Attacked?,"According to sources in the hacking circuit familiar with the goings-on of Wikileaks, the organization is adopting a new server cluster to replace those that have come under the denial-of-service attack. The security breaches were not connected to the site restructuring that has brought it down for about two weeks, said a Wikileaks volunteer. Because the organization's staff members operate on the policy of ""security through obscurity,"" insiders were not clear about the magnitude of or the parties behind the attack.",http://cybersecurityreport.nextgov.com/2010/10/wikileaks_communications_infrastructure_attacked.php?oref=latest_posts,10/21/2010,Denial of Service,Insufficient Anti-automation,Downtime,News,"San Mateo, CA",No,,,,,,,,
-2010-201,WHID 2010-201: Operation: Payback Hits SatelFilm.at with 'Drive By' DoS,"Operation: Payback apparently went on a preemptive strike, taking Satel Film by surprise and launching a 'drive by' DDoS (Distributed Denial of Service) attack. As of this writing, SatelFilm.at is offline.",http://www.slyck.com/story2097_Operation_Payback_Hits_SatelFilmat_with_Drive_By_DoS,10/21/2010,Denial of Service,Insufficient Anti-automation,Downtime,Media,"Wien, Austria",Yes,Operation Payback,1,,,,,,
-2010-201,WHID 2010-201: Operation: Payback Hits SatelFilm.at with 'Drive By' DoS,"Operation: Payback apparently went on a preemptive strike, taking Satel Film by surprise and launching a 'drive by' DDoS (Distributed Denial of Service) attack. As of this writing, SatelFilm.at is offline.",http://www.slyck.com/story2097_Operation_Payback_Hits_SatelFilmat_with_Drive_By_DoS,10/21/2010,Denial of Service,Insufficient Anti-automation,Downtime,Media,"Wien, Austria",Yes,Operation Payback,1,,,,,,
-2010-202,WHID 2010-202: NASA Website hacked and serving malware/spam,"Some sites under NASA???s Jet Propulsion lab ( http://jpl.nasa.gov/ ) have been hacked and are being used on the infamous blackhat SEO Spam network. Not only that, but they are also serving malware to unsuspicious users.",http://blog.sucuri.net/2010/10/nasa-web-site-hacked-and-serving-malwarespam.html,10/21/2010,Unknown,Misconfiguration,Planting of Malware,Government,"Phoenix, AZ",No,,,,,,,,
-2010-202,WHID 2010-202: NASA Website hacked and serving malware/spam,"Some sites under NASA???s Jet Propulsion lab ( http://jpl.nasa.gov/ ) have been hacked and are being used on the infamous blackhat SEO Spam network. Not only that, but they are also serving malware to unsuspicious users.",http://blog.sucuri.net/2010/10/nasa-web-site-hacked-and-serving-malwarespam.html,10/21/2010,Unknown,Misconfiguration,Planting of Malware,Government,"Phoenix, AZ",No,,,,,,,,
-2010-203,WHID 2010-203: Confessed student hacker speaks,"HOW HE SAYS HE HACKED THE SYSTEM
-2010-204,WHID 2010-204: How bank hackers beat Barclays,"The Barclays hack
-2010-205,WHID 2010-205: Hackers plant Firefox 0day on Nobel Peace Prize website,"Malicious hackers have exploited an unpatched vulnerability in the latest version of Firefox to attack people visiting the Nobel Peace Prize website, a Norway-based security firm said on Tuesday.",http://www.theregister.co.uk/2010/10/26/firefox_0day_report/,10/27/2010,Unknown,Improper Output Handling,Planting of Malware,Education,Norway,No,,,Taiwan,,,,,
-2010-205,WHID 2010-205: Hackers plant Firefox 0day on Nobel Peace Prize website,"Malicious hackers have exploited an unpatched vulnerability in the latest version of Firefox to attack people visiting the Nobel Peace Prize website, a Norway-based security firm said on Tuesday.",http://www.theregister.co.uk/2010/10/26/firefox_0day_report/,10/27/2010,Unknown,Improper Output Handling,Planting of Malware,Education,Norway,No,,,Taiwan,,,,,
-2010-206,WHID 2010-206: Tribal rights charity weathers DDoS assault,"The publication of footage of Indonesian soldiers torturing native Papuans appears to provoked a denial of service attack on the websites of development charities who hosted it.
-2010-207,WHID 2010-207: MWEB gets hacked,"The login details of over 2000 MWEB Business account-holders has been published online by a hacker.
-2010-208,WHID 2010-208: BoingBoing hacked and defaced,"BoingBoing.net, the popular blog and ""directory of wonderful things"", has been hacked and its home page replaced with a message containing vulgar language and pictures.
-2010-209,WHID 2010-209: Hacker may have accessed DHH database,"Department of Health and Hospitals spokeswoman Lisa Faust said Bureau of Emergency Medical Services personnel discovered the database breach. The unauthorized entry gave the hacker access to an individual???s name and personal information, including Social Security numbers.
-2010-20,WHID 2010-20: Jewish Community Assistance Group Website Hacked,"The internet website of the Keren Kehilot organization was hacked Sunday morning by a gang of Muslim hackers, apparently from Turkey.",http://www.israelnationalnews.com/News/Flash.aspx/182976,3/21/2010,Unknown,Improper Output Handling,Defacement,Religious,Israel,No,,,,,,,,
-2010-20,WHID 2010-20: Jewish Community Assistance Group Website Hacked,"The internet website of the Keren Kehilot organization was hacked Sunday morning by a gang of Muslim hackers, apparently from Turkey.",http://www.israelnationalnews.com/News/Flash.aspx/182976,3/21/2010,Unknown,Improper Output Handling,Defacement,Religious,Israel,No,,,,,,,,
-2010-210,WHID 2010-210: RIAA and LimeWire - Both Are Offline,"The schedule attack against the RIAA's website was set to begin at 4PM EST today, yet it seems either one of two things happened: 1) the RIAA intentionally brought their server offline, or 2) there was a premature attack on the website. Either way, the site is offline, and that seems to be good enough for Anonymous and supporters of Operation: Payback.",http://www.slyck.com/story2110_RIAA_and_LimeWire_Both_Are_Offline,10/29/2010,Denial of Service,Insufficient Anti-automation,Downtime,Entertainment,,Yes,Operation Payback,2,,,,,,
-2010-210,WHID 2010-210: RIAA and LimeWire - Both Are Offline,"The schedule attack against the RIAA's website was set to begin at 4PM EST today, yet it seems either one of two things happened: 1) the RIAA intentionally brought their server offline, or 2) there was a premature attack on the website. Either way, the site is offline, and that seems to be good enough for Anonymous and supporters of Operation: Payback.",http://www.slyck.com/story2110_RIAA_and_LimeWire_Both_Are_Offline,10/29/2010,Denial of Service,Insufficient Anti-automation,Downtime,Entertainment,,Yes,Operation Payback,2,,,,,,
-2010-211,WHID 2010-211: New DDoS Trojan Attacks Sites That Criticize Vietnamese Communist Party,"A new distributed denial-of-service (DDoS) Trojan family is being used to attack blogs and forums criticizing the Vietnamese Communist Party, a security researcher said yesterday.
-2010-212,WHID 2010-212: Cheapflights claims Twitter account hacked after X-Factor tirade,UPDATED: Cheapflights say the faux pas can be blamed on a Malware attack.,http://www.tnooz.com/2010/11/01/news/cheapflights-claims-twitter-account-hacked-after-x-factor-tirade/,10/31/2010,Malware,Unknown,Disinformation,Web 2.0,USA,No,,,,Twitter,,,,
-2010-212,WHID 2010-212: Cheapflights claims Twitter account hacked after X-Factor tirade,UPDATED: Cheapflights say the faux pas can be blamed on a Malware attack.,http://www.tnooz.com/2010/11/01/news/cheapflights-claims-twitter-account-hacked-after-x-factor-tirade/,10/31/2010,Malware,Unknown,Disinformation,Web 2.0,USA,No,,,,Twitter,,,,
-2010-213,WHID 2010-213: Cops: Hacker Posted Stolen X-rated Pics on Facebook,"The case shows how the information stored on social media sites can be misused, and ultimately turned against victims. Police believe that Bronk broke into about 3,200 Web mail accounts by guessing the answers to password reset questions used by services such as Gmail, Yahoo Mail and Microsoft's Hotmail.",http://www.pcworld.com/businesscenter/article/209584/cops_hacker_posted_stolen_xrated_pics_on_facebook.html,11/2/2010,Brute Force,Insufficient Password Recovery,Leakage of Information,Web 2.0,,No,,,,,,,,
-2010-213,WHID 2010-213: Cops: Hacker Posted Stolen X-rated Pics on Facebook,"The case shows how the information stored on social media sites can be misused, and ultimately turned against victims. Police believe that Bronk broke into about 3,200 Web mail accounts by guessing the answers to password reset questions used by services such as Gmail, Yahoo Mail and Microsoft's Hotmail.",http://www.pcworld.com/businesscenter/article/209584/cops_hacker_posted_stolen_xrated_pics_on_facebook.html,11/2/2010,Brute Force,Insufficient Password Recovery,Leakage of Information,Web 2.0,,No,,,,,,,,
-2010-214,WHID 2010-214: Attack cause Intuit Web-hosting service outage?,"Intuit's Web-hosting service for small businesses remained inaccessible for several hours today--possibly due to a denial-of-service attack, a customer service representative told CNET.
-2010-215,WHID 2010-215: Hacker Claims Full Compromise of Royal Navy Website,A hacker claims to have gained full access to the website of the British Royal Navy and the underlying database through an SQL injection attack.,http://news.softpedia.com/news/Hacker-Claims-Full-Compromise-of-Royal-Navy-Website-165112.shtml,11/5/2010,SQL Injection,Improper Input Handling,Leakage of Information,Government,United Kingdom,No,,,Romania,,,,,
-2010-215,WHID 2010-215: Hacker Claims Full Compromise of Royal Navy Website,A hacker claims to have gained full access to the website of the British Royal Navy and the underlying database through an SQL injection attack.,http://news.softpedia.com/news/Hacker-Claims-Full-Compromise-of-Royal-Navy-Website-165112.shtml,11/5/2010,SQL Injection,Improper Input Handling,Leakage of Information,Government,United Kingdom,No,,,Romania,,,,,
-2010-216,WHID 2010-216: DDoS: Myanmar attacks larger than those against Estonia and Georgia,"Starting towards the end of October, the nation of Myanmar (previously known as Burma) has been suffering through a massive Denial of Service attack, leaving Web access at a crawl when it is available. According to Arbor Networks, the Myanmar attack is producing far more traffic than what was observed during the DDoS attacks on Estonia and Georgia.",http://www.thetechherald.com/article.php/201044/6381/DDoS-Myanmar-attacks-larger-than-those-against-Estonia-and-Georgia,11/4/2010,Denial of Service,Insufficient Anti-automation,Downtime,Internet,Myanmar,No,,,,,,,,
-2010-216,WHID 2010-216: DDoS: Myanmar attacks larger than those against Estonia and Georgia,"Starting towards the end of October, the nation of Myanmar (previously known as Burma) has been suffering through a massive Denial of Service attack, leaving Web access at a crawl when it is available. According to Arbor Networks, the Myanmar attack is producing far more traffic than what was observed during the DDoS attacks on Estonia and Georgia.",http://www.thetechherald.com/article.php/201044/6381/DDoS-Myanmar-attacks-larger-than-those-against-Estonia-and-Georgia,11/4/2010,Denial of Service,Insufficient Anti-automation,Downtime,Internet,Myanmar,No,,,,,,,,
-2010-217,WHID 2010-217: Conservative party web CMS system hacked,"SQL injection flaw in CMS system allowed admin access to many smaller individual and regional Conservative party web sites (the main site www.conservatives.com was unaffected). The password field for the CMS login page was susceptible to a SQL injection attack allowing access to arbitrary user accounts including the CMS administrator account.
-2010-218,WHID 2010-218: Secunia recovers from DNS redirection hack,"Security notification firm Secunia has confirmed that a DNS redirection hack was to blame for the redirection of surfers to a hacker site on Thursday.
-2010-219,WHID 2010-219: The Jester Hits WikiLeaks Site With XerXeS DoS Attack,Infamous anti-jihadi hacker The Jester (th3j35t3r) is claiming responsibility for a denial of service attack (DoS) attack that temporarily disabled the WikiLeaks website just hours before the release of thousands of classified documents.,https://www.infosecisland.com/blogview/9865-The-Jester-Hits-WikiLeaks-Site-With-XerXeS-DoS-Attack.html,11/29/2010,Denial of Service,Insufficient Anti-automation,Downtime,Blogs,France,No,,,,,,,,
-2010-219,WHID 2010-219: The Jester Hits WikiLeaks Site With XerXeS DoS Attack,Infamous anti-jihadi hacker The Jester (th3j35t3r) is claiming responsibility for a denial of service attack (DoS) attack that temporarily disabled the WikiLeaks website just hours before the release of thousands of classified documents.,https://www.infosecisland.com/blogview/9865-The-Jester-Hits-WikiLeaks-Site-With-XerXeS-DoS-Attack.html,11/29/2010,Denial of Service,Insufficient Anti-automation,Downtime,Blogs,France,No,,,,,,,,
-2010-21,"WHID 2010-21: Wiseguys Tickets charged with hacking into Ticketmaster, LiveNation to illegally grab best seats","This entry is related to WHID 2008-48 (http://www.xiom.com/whid-2008-48) however it expands beyond only TicketMaster to include LiveNation.
-2010-220,WHID 2010-220: Savannah GNU Hacked,"There's been a SQL injection leading to leaking of encrypted account passwords, some of them discovered by brute-force attack, leading in turn to project membership access.
-2010-221,"WHID 2010-221: 4chan rushes to WikiLeaks' defense, forces Swiss banking site offline","The forces of Anonymous have taken aim at several companies who are refusing to do business with WikiLeaks. 4chan's hordes have launched distributed denial-of-service attacks against PayPal, Swiss bank PostFinance, and other sites that have hindered the whistleblowing site's operations.",http://arstechnica.com/tech-policy/news/2010/12/4chan-rushes-to-wikileaks-defense-forces-swiss-banking-site-offline.ars,12/7/2010,Denial of Service,Insufficient Anti-automation,Downtime,Finance,Switzerland,No,,,,,,,,
-2010-221,"WHID 2010-221: 4chan rushes to WikiLeaks' defense, forces Swiss banking site offline","The forces of Anonymous have taken aim at several companies who are refusing to do business with WikiLeaks. 4chan's hordes have launched distributed denial-of-service attacks against PayPal, Swiss bank PostFinance, and other sites that have hindered the whistleblowing site's operations.",http://arstechnica.com/tech-policy/news/2010/12/4chan-rushes-to-wikileaks-defense-forces-swiss-banking-site-offline.ars,12/7/2010,Denial of Service,Insufficient Anti-automation,Downtime,Finance,Switzerland,No,,,,,,,,
-2010-222,WHID 2010-222: SQL Injection Blamed for Twin America Breach,"The breach of a Web server that housed payment card data for a New York tourism company's website highlights security gaps in cardholder data protection.
-2010-223,2010-223: FutureBazaar Site Hit By DoS Attack,"Future Group''s plans to boost on-line sales has come across a cyber hurdle with its flagship e-commerce portal FutureBazaar being hacked and has been rendered the site dysfunctional for the last two days.
-2010-22,WHID 2010-22: Hackers target SDP leaders,"At least two leading figures in the opposition Social Democratic Party were attacked by computer hackers during the weekend.
-2010-23,"WHID 2010-23: Beware: Malware Attacks Facebook, B-Ball & Gossip Sites","At a time when college basketball fans are going wild, cybercriminals are actively pursuing opportunities for scams. Basketball fans go online to fill out bracket selections, and when they do, hackers are also playing their own game of spamdexing, i.e. manipulating search results to promote sites, according to James Duldulao, a security researcher at McAfee. In this case, he explained, cybercriminals are spamdexing malware-infected sites.
-2010-24,"WHID 2010-24: Singapore's biggest forum, Hardwarezone Forums, gets hacked (friendly)","Yesterday, at 8pm past, a member ""gameboyz"" discovered pretty quickly that he could inject HTML code into the Tag Board Chat, and posted a script which changed the contents of the page where the tagboard would appear, with a message below, when one accessed certain sections of the site.",,3/18/2010,Cross Site Scripting (XSS),Improper Output Handling,Defacement,Retail,Singapore,No,,,,,,,,http://asia.cnet.com/blogs/rehashplus/post.htm?id=63017848&scid=hm_bl
-2010-24,"WHID 2010-24: Singapore's biggest forum, Hardwarezone Forums, gets hacked (friendly)","Yesterday, at 8pm past, a member ""gameboyz"" discovered pretty quickly that he could inject HTML code into the Tag Board Chat, and posted a script which changed the contents of the page where the tagboard would appear, with a message below, when one accessed certain sections of the site.",,3/18/2010,Cross Site Scripting (XSS),Improper Output Handling,Defacement,Retail,Singapore,No,,,,,,,,http://asia.cnet.com/blogs/rehashplus/post.htm?id=63017848&scid=hm_bl
-2010-25,WHID 2010-25: Flawed Security Exposes Vital Software to Hackers,"McAfee, a leading maker of Internet security software, warned this week that software systems used by many companies to store and manage their intellectual property are being actively targeted by hackers and are in need of significantly increased security focus.
-2010-26,WHID 2010-26: Russia Arrests Alleged Mastermind of RBS WorldPay Hack,"A fascinating story about a group of hackers who broke into the RBS WorldPay DBs through SQL Injection. Russian authorities have nabbed the man accused of masterminding a coordinated global ATM heist of $9.5 million from Atlanta-based card processing company RBS WorldPay. The hackers compromised RBS WorldPay???s database encryption to raise the amount of funds available on the compromised cards, and boost their daily withdrawal limits. In some case, the hackers raised the limits to $500,000. According to the indictment, Tsurikov conducted reconnaissance of the RBS network after Covelin provided him with information about vulnerabilities in the system. Pleshchuk and Covelin then worked on exploiting the vulnerabilities to obtain access. Pleschuk allegedly developed the method for reverse engineering the encrypted PINs. Once the hackers raised the account limits, they provided an army of cashers with 44 cards programmed with the account details. On November 8 that year, the cashers simultaneously hit more than 2,000 ATMs, netting about $9.5 million in less than 12 hours.
-2010-27,"WHID 2010-27: Poughkeepsie, N.Y., slams bank for $378,000 online theft","The theft of $378,000 from the town of Poughkeepsie, N.Y., is prompting questions about the responsibility of banks to protect customer accounts from online criminals.
-2010-28,"WHID 2010-28: Bank sues victim of $800,000 cybertheft","A Texas bank is suing a customer hit by an $800,000 cybertheft incident in a case that could test the extent to which customers should be held responsible for protecting their online accounts from compromises.
-2010-29,WHID 2010-29: Conservatives embarrassed as hackers exploit loophole on anti-union website,"It was hoped that visitors to the website - http://cash-gordon.com ??? would use popular social networking websites such as Twitter and Facebook to spread the word about Gordon Brown???s union links.
-2010-2,WHID 2010-2: Hacker Disables More Than 100 Cars Remotely,"Hundreds of cars would not start and/or had their horn honking when a former employee at Texas Auto Center used previous passwords to log into a system called Webtech Plus whic is used as an alternative to repossessing vehicles that haven???t been paid for. Operated by Cleveland-based Pay Technologies, the system lets car dealers install a small black box under vehicle dashboards that responds to commands issued through a central website, and relayed over a wireless pager network. The dealer can disable a car???s ignition system, or trigger the horn to begin honking, as a reminder that a payment is due. The hacker destroyed account records and then started to disable cars/force the horn to honk continuously.
-2010-30,WHID 2010-30: Organized Crooks Hit NJ Town,"The Federal Bureau of Investigation and the Atlantic County Prosecutor's Office are helping Egg Harbor Township police investigate what township police said was an ""outside intrusion into a municipal banking account""that was to blame for missing municipal funds.""
-2010-31,WHID 2010-31: Organized Crooks Hit Ark. Utility,"In a separate incident on March 4, organized crooks stole roughly $130,000 from North Garland County Regional Water District, a public, nonprofit utility in Hot Springs, Ark. Again, thieves somehow broke into the utility???s online bank account and set up unauthorized transfers to more than a dozen individuals around the country that were not affiliated with the district.
-2010-32,WHID 2010-32: Crooks Crank Up Volume of E-Banking Attacks,"Computer crooks stole more than $200,000 from an auto body shop in Ohio last month in a brazen online robbery. The attack is yet another example of how thieves are using malicious software to bypass bank security technologies that are often touted as strong deterrents to this type of fraud.
-2010-33,"WHID 2010-33: N.Y. Firm Faces Bankruptcy from $164,000 E-Banking Loss","A New York marketing firm that as recently as two weeks ago was preparing to be acquired now is facing bankruptcy from a computer virus infection that cost the company more than $164,000.
-2010-34,WHID 2010-34: Over 120 000 Sanoma User Credentials Stolen,"Not exactly a startup news per se, but a healthy reminder to all those working with user credentials in their online services. One of the largest, if not the largest, online identity thefts has just occured in Finland. The service to be breached was ??lyp?_?_, a Sanoma bought gaming site. The sad part is that while an identity breach of this magnitude is always bad ??? this has been made worse by Sanoma actually storing the passwords in plain text, making them usable anywhere.",http://www.arcticstartup.com/2010/03/23/over-120-000-sanoma-user-credentials-stolen/?ref=rc,3/23/2010,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,Finland,No,,,,,,,,
-2010-34,WHID 2010-34: Over 120 000 Sanoma User Credentials Stolen,"Not exactly a startup news per se, but a healthy reminder to all those working with user credentials in their online services. One of the largest, if not the largest, online identity thefts has just occured in Finland. The service to be breached was ??lyp?_?_, a Sanoma bought gaming site. The sad part is that while an identity breach of this magnitude is always bad ??? this has been made worse by Sanoma actually storing the passwords in plain text, making them usable anywhere.",http://www.arcticstartup.com/2010/03/23/over-120-000-sanoma-user-credentials-stolen/?ref=rc,3/23/2010,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,Finland,No,,,,,,,,
-2010-35,WHID 2010-35: CISO Witnesses Hack Like No Other,"Here's what Maley told attendees to an RSA Conference panel on state cybersecurity on Wednesday:
-2010-36,WHID 2010-36: Durex condom orders leak on web ??? customer (update 1),"Last week, this site received a lead about a security problem involving the web site of a Durex product. On March 5, a customer reportedly discovered that anyone could view his and other customers??? orders on the kohinoorpassion.com web site by simply inserting a different order ID number in the url without any login required. Names, addresses, phone numbers, and type of products ordered were all there for ready viewing.",http://www.databreaches.net/?p=10726,3/22/2010,Predictable Resource Location,Insufficient Authorization,Leakage of Information,Retail,India,No,,,,,,,,
-2010-36,WHID 2010-36: Durex condom orders leak on web ??? customer (update 1),"Last week, this site received a lead about a security problem involving the web site of a Durex product. On March 5, a customer reportedly discovered that anyone could view his and other customers??? orders on the kohinoorpassion.com web site by simply inserting a different order ID number in the url without any login required. Names, addresses, phone numbers, and type of products ordered were all there for ready viewing.",http://www.databreaches.net/?p=10726,3/22/2010,Predictable Resource Location,Insufficient Authorization,Leakage of Information,Retail,India,No,,,,,,,,
-2010-37,WHID 2010-37: ING Shareholder Data Exposed on Website,"On January 25, an ING customer discovered that she could access client information on the ingfunds.com web site and notified her stockbroker. In investigating the situation, ING discovered that since August 2008, a file containing the names, addresses, Social Security numbers, and account numbers of 106 ING shareholders had been available on the web through a search engine. The company notified the New Hampshire Attorney General on February 3 that 17 residents of the state were affected.",http://doj.nh.gov/consumer/pdf/ing.pdf,1/25/2010,Unintentional Information Disclosure,Insufficient Authorization,Leakage of Information,Finance,,No,,,"New Hampshire, USA",,,,,
-2010-37,WHID 2010-37: ING Shareholder Data Exposed on Website,"On January 25, an ING customer discovered that she could access client information on the ingfunds.com web site and notified her stockbroker. In investigating the situation, ING discovered that since August 2008, a file containing the names, addresses, Social Security numbers, and account numbers of 106 ING shareholders had been available on the web through a search engine. The company notified the New Hampshire Attorney General on February 3 that 17 residents of the state were affected.",http://doj.nh.gov/consumer/pdf/ing.pdf,1/25/2010,Unintentional Information Disclosure,Insufficient Authorization,Leakage of Information,Finance,,No,,,"New Hampshire, USA",,,,,
-2010-38,WHID 2010-38: Cross-Site Scripting through Flash in Gmail Based Services,IBM Security Researcher outlines the XSS vuln he found that exploits a Flash upload file movie by passing Javascript within external parameters.,http://blog.watchfire.com/wfblog/2010/03/cross-site-scripting-through-flash-in-gmail-based-services.html,3/22/2010,Cross Site Scripting (XSS),Improper Output Handling,Leakage of Information,Information Services,,No,,,,,,,,
-2010-38,WHID 2010-38: Cross-Site Scripting through Flash in Gmail Based Services,IBM Security Researcher outlines the XSS vuln he found that exploits a Flash upload file movie by passing Javascript within external parameters.,http://blog.watchfire.com/wfblog/2010/03/cross-site-scripting-through-flash-in-gmail-based-services.html,3/22/2010,Cross Site Scripting (XSS),Improper Output Handling,Leakage of Information,Information Services,,No,,,,,,,,
-2010-39,WHID 2010-39: Tesda Website hacked again; users directed to Smartmatic,"Even before its administrators could fix the problem, the website of the Technical Education and Skills Development Authority was hacked again early Monday, this time redirecting visitors to the website of Smartmatic, the contractor tasked to implement the automated elections this May. A check of the hacked TESDA website's homepage showed the hackers left instructions for the site to redirect to Smartmatic's website in 20 seconds.",http://www.gmanews.tv/story/181244/tesda-website-hacked-again-users-redirected-to-smartmatic,1/11/2010,Cross Site Scripting (XSS),Improper Output Handling,Defacement,Government,Phillipines,No,,,,,,,,
-2010-39,WHID 2010-39: Tesda Website hacked again; users directed to Smartmatic,"Even before its administrators could fix the problem, the website of the Technical Education and Skills Development Authority was hacked again early Monday, this time redirecting visitors to the website of Smartmatic, the contractor tasked to implement the automated elections this May. A check of the hacked TESDA website's homepage showed the hackers left instructions for the site to redirect to Smartmatic's website in 20 seconds.",http://www.gmanews.tv/story/181244/tesda-website-hacked-again-users-redirected-to-smartmatic,1/11/2010,Cross Site Scripting (XSS),Improper Output Handling,Defacement,Government,Phillipines,No,,,,,,,,
-2010-3,WHID 2010-3: Feds Crack Hackers' Stock Manipulation Cybercrime,"Hackers, working for BroCo Investments (a one-trader operation based in St. Petersburg, Russia) used stolen online brokerage credentials to initiate a pump-and-dump scheme. Within minutes of making the unauthorized transactions, the SEC claims BroCo then sold shares of these same stocks held in its own account at the artificially inflated prices, netting the hackers more than $250,000 in profits.
-2010-40,"WHID 2010-40: TCS Website Hacked, Domain Name Up For Sale",Indian software giant Tata Consultancy Services Ltd. (TCS) has witnessed the hijacking of its official website www.tcs.com. The hackers not only attacked the website but also allegedly changed its domain name and put it up for sale!,http://www.techtree.com/India/News/TCS_Website_Hacked_Domain_Name_Up_For_Sale/551-109190-643.html,2/8/2010,DNS Hijacking,Insufficient Process Validation,Defacement,Technology,India,No,,,,,,,,
-2010-40,"WHID 2010-40: TCS Website Hacked, Domain Name Up For Sale",Indian software giant Tata Consultancy Services Ltd. (TCS) has witnessed the hijacking of its official website www.tcs.com. The hackers not only attacked the website but also allegedly changed its domain name and put it up for sale!,http://www.techtree.com/India/News/TCS_Website_Hacked_Domain_Name_Up_For_Sale/551-109190-643.html,2/8/2010,DNS Hijacking,Insufficient Process Validation,Defacement,Technology,India,No,,,,,,,,
-2010-41,WHID 2010-41: NineMSN compromised,"Microsoft's Ninemsn, one of the most visited portals in Australia (Alexa rank 573), was compromised and injected with malicious code. The malicious code was identified to be part of the Gumblar mass injections.",http://www.itwire.com/business-it-news/security/36912-ninemsn-compromised,2/17/2010,Unknown,Improper Output Handling,Planting of Malware,Internet,Australia,No,,,,,,,,
-2010-41,WHID 2010-41: NineMSN compromised,"Microsoft's Ninemsn, one of the most visited portals in Australia (Alexa rank 573), was compromised and injected with malicious code. The malicious code was identified to be part of the Gumblar mass injections.",http://www.itwire.com/business-it-news/security/36912-ninemsn-compromised,2/17/2010,Unknown,Improper Output Handling,Planting of Malware,Internet,Australia,No,,,,,,,,
-2010-42,WHID 2010-42: Frenchman Arrested After Hacking Into Obama's Twitter Accounts,"A Frenchman will face trial after hacking into Twitter accounts, including that of U.S President Barack Obama, a French prosecutor said.
-2010-43,WHID 2010-43: Sleuths Trace Digital Clues to Predict iPad Sales,"To get the ball rolling on the iPad estimate, Mr. Tello asked participants on a private message board for Apple watchers, AAPL Sanity, to share the order number that the Apple Store assigns to each online purchase and includes on the order's email confirmation.
-2010-44,WHID 2010-44: Baidu hacked by Iranian Cyber Army,"The attack, which took place overnight, saw a message from the Iranian Cyber Army appear on the Baidu home page. It featured a picture of the Iranian flag, and a message written in Farsi.
-2010-45,"WHID 2010-45: Online Thieves Take $205,000 Bite Out of Missouri Dental Practice","Organized computer criminals yanked more than $200,000 out of the online bank accounts of a Missouri dental practice this month, in yet another attack that exposes the financial risks that small- to mid-sized organizations face when banking online.
-2010-46,"WHID 2010-46: Microsoft's Larry ""Major Nelson"" Hryb has online account hijacked through Xbox.com as part of underground group's publicity bid.","Xbox Live director of programming Larry Hryb has for some time now been the face of Microsoft's online platform for the Xbox 360, thanks in large part to his Major Nelson persona. Unfortunately, Xbox Live's figurehead saw his gamertag defaced over the weekend after a hacker was able to log into Hryb's account.",http://www.gamespot.com/news/6254330.html,3/29/2010,Unknown,Unknown,Leakage of Information,Entertainment,,No,,,,,,,,
-2010-46,"WHID 2010-46: Microsoft's Larry ""Major Nelson"" Hryb has online account hijacked through Xbox.com as part of underground group's publicity bid.","Xbox Live director of programming Larry Hryb has for some time now been the face of Microsoft's online platform for the Xbox 360, thanks in large part to his Major Nelson persona. Unfortunately, Xbox Live's figurehead saw his gamertag defaced over the weekend after a hacker was able to log into Hryb's account.",http://www.gamespot.com/news/6254330.html,3/29/2010,Unknown,Unknown,Leakage of Information,Entertainment,,No,,,,,,,,
-2010-47,WHID 2010-47: Court papers: JC Penney was hacking victim,"JC Penney Co. was one of the victims of notorious computer hacker Albert Gonzalez, according to unsealed documents made available on Monday by a federal judge in Boston.
-2010-48,"WHID 2010-48: Hackers brute force their way into galeton.com website containing names, credit card numbers",Hackers used brute force to log into web accounts of users at www.galeton.com.,http://datalossdb.org/incidents/2692-hackers-brute-force-their-way-into-website-containing-names-credit-card-numbers,2/8/2010,Brute Force,Insufficient Anti-automation,Credit Card Leakage,Retail,,No,,,,,,,,
-2010-48,"WHID 2010-48: Hackers brute force their way into galeton.com website containing names, credit card numbers",Hackers used brute force to log into web accounts of users at www.galeton.com.,http://datalossdb.org/incidents/2692-hackers-brute-force-their-way-into-website-containing-names-credit-card-numbers,2/8/2010,Brute Force,Insufficient Anti-automation,Credit Card Leakage,Retail,,No,,,,,,,,
-2010-49,"WHID 2010-49: Hackers pluck 8,300 customer logins from bank server","Hackers have stolen the login credentials for more than 8,300 customers of small New York bank after breaching its security and accessing a server that hosted its online banking system.
-2010-4,WHID 2010-4: Shopping website hacked with malware,"Australian retailer DealsDirect.com.au started serving malware to clients through a compromised partner advertising system. It seems that end users were made aware of malware due to Google Safe Browsing plugins in Google Chrome, Firefox and Internet Explorer browsers as they were alerted with the ""This site may harm your computer"" warning. It is a shame that web sites themselves aren't doing better at analyzing outbound data they are serving to ensure that it is not malicious.",http://news.ninemsn.com.au/technology/1029568/shopping-website-hacked-with-malware,3/19/2010,Content Spoofing,Improper Output Handling,Planting of Malware,Retail,Australia,No,,,,,,,,
-2010-50,WHID 2010-50: Shared-password vulnerability may have exposed personal information in online account management system,"Lincoln National Corp. (LNC) last week disclosed a security vulnerability in its portfolio information system that could have compromised the account data of approximately 1.2 million customers.
-2010-51,WHID 2010-51: Woman worms into D.C. taxpayer accounts,"A mentally ill woman exploited a loophole in D.C. tax office online systems to gain unauthorized access to taxpayer accounts, establish herself as the owner of dozens of businesses and file returns on their behalf. The FR-500 forms were not submitted for review before processing, BDO found, and no verification checks were performed. The loophole was a glitch, OTR explained. The agency's Integrated Tax System was supposed to deny ownership changes requested through the FR-500 function, but ""faulty logic"" allowed the updates automatically. Umansky said a fix is now in place and ""that can't happen again.""",http://www.washingtonexaminer.com/local/Woman-worms-into-D_C_-taxpayer-accounts-83589257.html,2/5/2010,Abuse of Functionality,Insufficient Process Validation,Leakage of Information,Government,"Washington DC, USA",No,,,,,,,,
-2010-51,WHID 2010-51: Woman worms into D.C. taxpayer accounts,"A mentally ill woman exploited a loophole in D.C. tax office online systems to gain unauthorized access to taxpayer accounts, establish herself as the owner of dozens of businesses and file returns on their behalf. The FR-500 forms were not submitted for review before processing, BDO found, and no verification checks were performed. The loophole was a glitch, OTR explained. The agency's Integrated Tax System was supposed to deny ownership changes requested through the FR-500 function, but ""faulty logic"" allowed the updates automatically. Umansky said a fix is now in place and ""that can't happen again.""",http://www.washingtonexaminer.com/local/Woman-worms-into-D_C_-taxpayer-accounts-83589257.html,2/5/2010,Abuse of Functionality,Insufficient Process Validation,Leakage of Information,Government,"Washington DC, USA",No,,,,,,,,
-2010-52,WHID 2010-52: 3000 Small Dog Electronics customers' credit card details compromised,"lectronics retailer Small Dog Electronics has suffered from a systems breach that left 3000 customers' credit card details compromised.
-2010-53,WHID 2010-53: Google says Vietnam political blogs hacked,"Internet giant Google says Vietnamese computer users have been spied on and political blogs hacked in attacks which a leading web security firm suspects are linked to the Vietnamese government.
-2010-54,WHID 2010-54: MyPilotStore.com hack results in false charges on customers??? cards,"On February 18, MyPlane, dba MyPilotStore.com, discovered that their database containing their customers??? names, addresses, telephone numbers, e-mail addresses, and credit card information had been hacked. According to the firm, some customers received a ???nominal fake charge to their credit card by a company not associated with us.???",http://www.databreaches.net/?p=10990,2/18/2010,SQL Injection,Improper Input Handling,Credit Card Leakage,Retail,,No,,,,,,,,
-2010-54,WHID 2010-54: MyPilotStore.com hack results in false charges on customers??? cards,"On February 18, MyPlane, dba MyPilotStore.com, discovered that their database containing their customers??? names, addresses, telephone numbers, e-mail addresses, and credit card information had been hacked. According to the firm, some customers received a ???nominal fake charge to their credit card by a company not associated with us.???",http://www.databreaches.net/?p=10990,2/18/2010,SQL Injection,Improper Input Handling,Credit Card Leakage,Retail,,No,,,,,,,,
-2010-55,"WHID 2010-55: Drudge Report accused of serving malware, again","For the second time in less than six months, visitors to the Drudge Report say they got malware in addition to the Web site's usual sensational headlines.
-2010-56,WHID 2010-56: Facebook Flub Leaks Private E-Mail Addresses,"Private e-mail addresses that many Facebook users wanted to keep hidden were revealed publicly last night on a multitude of Facebook profiles, Gawker reports. The glitch lasted about 30 minutes before Facebook sealed the gap.
-2010-57,WHID 2010-57: Web security under attack from ads in prominent advertising programs,"Advertisement programs operated by Google, Yahoo and Fox were recently found to deliver malware, according to CNET. Avast, the Czech Republic-based web security company, discovered the malware and stated that this particular strain target holes in popular web browsers such as Firefox and Internet Explorer.
-2010-58,WHID 2010-58: China journalist club shuts website after attack,"The Foreign Correspondents Club of China said on Friday it had shut its website after a burst of hacker attacks, days after attacks on the Yahoo email accounts of some foreign journalists covering China were discovered.
-2010-59,WHID 2010-59: Orange Regional Website Hacked,"A Lebanese hacker claims to have hacked Orange's regional website in Cote d'Ivoire (Ivory Coast) through SQL injection. The attack allegedly gave him access to the website's administration interface and information on almost 60,000 customers.",http://news.softpedia.com/news/Orange-Regional-Website-Hacked-134467.shtml,2/9/2010,SQL Injection,Improper Input Handling,Leakage of Information,Information Services,Ivory Coast,No,,,Lebanon,,,,60000,
-2010-59,WHID 2010-59: Orange Regional Website Hacked,"A Lebanese hacker claims to have hacked Orange's regional website in Cote d'Ivoire (Ivory Coast) through SQL injection. The attack allegedly gave him access to the website's administration interface and information on almost 60,000 customers.",http://news.softpedia.com/news/Orange-Regional-Website-Hacked-134467.shtml,2/9/2010,SQL Injection,Improper Input Handling,Leakage of Information,Information Services,Ivory Coast,No,,,Lebanon,,,,60000,
-2010-5,WHID 2010-5: City of Albertville's web site hacked,"The website of the Mayor of Albertsville, AL was defaced with profanity.",http://www.waff.com/Global/story.asp?S=12166330,3/18/2010,Unknown,Improper Output Handling,Defacement,Politics,"Alabama, USA",No,,,"Alabama, USA",,,,,
-2010-60,WHID 2010-60: CNN redirect exploited by scammers,"SPAMMERs use an Open Redirection vuln in a CNN ad site. The clever touch was providing a link that exploits redirect functionality supported by CNN???s ad servers. The link is structured as follows:
-2010-61,"WHID 2010-61: How Chinese Hackers Exploit Twitter, Google and Yahoo","A stunning new report issued last night by a team of U.S. and Canadian researchers highlights a critical development in the world of cyber crime: the use of popular services like Twitter, Google (GOOG) and Yahoo (YHOO) to camouflage and carry out infiltrations at the highest level of international government and business.",http://blogs.bnet.com/business-news/?p=856,4/6/2010,Abuse of Functionality,Abuse of Functionality,Leakage of Information,Web 2.0,,No,,,China,,,,,http://www.scribd.com/doc/29435784/SHADOWS-IN-THE-CLOUD-Investigating-Cyber-Espionage-2-0
-2010-61,"WHID 2010-61: How Chinese Hackers Exploit Twitter, Google and Yahoo","A stunning new report issued last night by a team of U.S. and Canadian researchers highlights a critical development in the world of cyber crime: the use of popular services like Twitter, Google (GOOG) and Yahoo (YHOO) to camouflage and carry out infiltrations at the highest level of international government and business.",http://blogs.bnet.com/business-news/?p=856,4/6/2010,Abuse of Functionality,Abuse of Functionality,Leakage of Information,Web 2.0,,No,,,China,,,,,http://www.scribd.com/doc/29435784/SHADOWS-IN-THE-CLOUD-Investigating-Cyber-Espionage-2-0
-2010-62,"WHID 2010-62: Computer Crooks Steal $100,000 from Ill. Town","A rash of home foreclosures and abandoned dwellings had already taken its toll on the tax revenue for the Village of Summit, a town of 10,000 just outside Chicago. Then, in March, computer crooks broke into the town???s online bank account, making off with nearly $100,000. According to Rivera, the theft took place Mar. 11, when her assistant went to log in to the town???s account at Bridgeview Bank. When the assistant submitted the credentials to the bank???s site, she was redirected to a page telling her that the bank???s site was experiencing technical difficulties. What she couldn???t have known was that the thieves were stalling her so that they could use the credentials she???d supplied to create their own interactive session with the town???s bank account.",http://www.krebsonsecurity.com/2010/04/computer-crooks-steal-100000-from-ill-town/,3/11/2010,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,"Illinois, USA",No,,,,,,,,
-2010-62,"WHID 2010-62: Computer Crooks Steal $100,000 from Ill. Town","A rash of home foreclosures and abandoned dwellings had already taken its toll on the tax revenue for the Village of Summit, a town of 10,000 just outside Chicago. Then, in March, computer crooks broke into the town???s online bank account, making off with nearly $100,000. According to Rivera, the theft took place Mar. 11, when her assistant went to log in to the town???s account at Bridgeview Bank. When the assistant submitted the credentials to the bank???s site, she was redirected to a page telling her that the bank???s site was experiencing technical difficulties. What she couldn???t have known was that the thieves were stalling her so that they could use the credentials she???d supplied to create their own interactive session with the town???s bank account.",http://www.krebsonsecurity.com/2010/04/computer-crooks-steal-100000-from-ill-town/,3/11/2010,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,"Illinois, USA",No,,,,,,,,
-2010-63,WHID 2010-63: Police cuff 70 eBay fraud suspects,"Romanian police have arrested 70 suspected cybercrooks, thought to be members of three gangs which allegedly used compromised eBay accounts to run scams.
-2010-64,WHID 2010-64: Hundreds of Wordpress Blogs Hit by ???Networkads.net??? Hack,"A large number of bloggers using Wordpress are reporting that their sites recently were hacked and are redirecting visitors to a page that tries to install malicious software.
-2010-65,WHID 2010-65: NewsBusters Knocked Offline,"A deliberate brute force attack, a criminal act, knocked NewsBusters offline since late Friday morning. More information to come, but now we???re back and we thank you for bearing with us as our tech team worked studiously to restore the site.
-2010-66,WHID 2010-66: Ads to blame for malware in Facebook's FarmTown?,"The 9.6 million players of the Facebook game FarmTown are being warned about fake security warnings popping up that are designed to mislead people into paying for antivirus protection they don't need.
-2010-67,"WHID 2010-67: Apache.org hit by targeted XSS attack, passwords compromised","On April 5th, the attackers via a compromised Slicehost server opened a new issue, INFRA-2591. This issue contained the following text:
-2010-68,WHID 2010-68: Daily Telegraph website hacked,"Part of the Daily Telegraph's website has been hacked, apparently by people in Romania who were aggrieved at its identification of ""gypsies"" and ""Romanians"".
-2010-69,WHID 2010-69: Walmart web site hacked and hosting spam,"One of Walmart official web sites, www.walmartcommunity.com (for their Community Action Network) has SPAM links. The attackers probably injected the spam in one of their templates files. After a bit of search, we found all of them inside the footer.php",http://blog.sucuri.net/2010/04/walmart-web-site-hacked-and-hosting.html,4/15/2010,Unknown,Unknown,Link Spam,Retail,USA,No,,,,WordPress,,,,
-2010-69,WHID 2010-69: Walmart web site hacked and hosting spam,"One of Walmart official web sites, www.walmartcommunity.com (for their Community Action Network) has SPAM links. The attackers probably injected the spam in one of their templates files. After a bit of search, we found all of them inside the footer.php",http://blog.sucuri.net/2010/04/walmart-web-site-hacked-and-hosting.html,4/15/2010,Unknown,Unknown,Link Spam,Retail,USA,No,,,,WordPress,,,,
-2010-6,WHID 2010-6: Cyber hacker hits Paula Dockery's campaign site,"Attacker(s) conducted a DDoS attack against the Florida Candidate for Governor Paula Dockery's website. In essence, what is happening is someone is sending approximately 40,000 requests per second to the website/server, then immediately closing them??_ It is the equivalent of 2.4 million people a minute browsing to the site and closing it immediately. In essence this saturates the number of connections available to legitimate people trying to get to the server, causing them to time-out when they visit the site. In security terms it is called a Denial of Service Attack (DoS).",http://blogs.tampabay.com/buzz/2010/01/cyber-hacker-hits-paula-dockerys-campaign-site.html,1/20/2010,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Florida, USA",No,,,,,,,,
-2010-70,WHID 2010-70: Armenian websites attacked Turkish hackers,"Turkish hackers have attacked several Armenian websites ahead of annual commemorative remembrances of the Armenian Genocide.
-2010-71,WHID 2010-71: Fire Alarm Company Burned by e-Banking Fraud,"A fire alarm company in Arkansas lost more than $110,000 this month when hackers stole the firm???s online banking credentials and drained its payroll account.",http://krebsonsecurity.com/2010/04/fire-alarm-company-burned-by-e-banking-fraud/,4/7/2010,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,USA,No,,,,,"$110,000 ",,,
-2010-71,WHID 2010-71: Fire Alarm Company Burned by e-Banking Fraud,"A fire alarm company in Arkansas lost more than $110,000 this month when hackers stole the firm???s online banking credentials and drained its payroll account.",http://krebsonsecurity.com/2010/04/fire-alarm-company-burned-by-e-banking-fraud/,4/7/2010,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,USA,No,,,,,$110000,,,
-2010-72,WHID 2010-72: Blippy users??? credit card numbers found on Google,"Yesterday was a big day for social-oversharing site Blippy, which lets members automatically post their purchases to the Internet. The company announced $11.2 million in funding and was profiled in The New York Times.
-2010-73,WHID 2010-73: Report: Music insider site source of leaked songs,"As if the record industry hasn't tasted enough bitter irony lately, a bunch of album leaks over the weekend apparently came from a service used by music labels to share files with radio stations, media, and other trusted insiders.
-2010-74,WHID 2010-74: Another Zimbabwe news website attacked by hackers,"London(ZimEye) Another Zimbabwe news website, the ZimDiaspora has been hacked by online criminals. As at Saturday, the website was no longer functioning and one of the editors speaking to ZimEye Saturday said that neither he nor the Hosting company were able to restore the site at the moment.
-2010-75,WHID 2010-75: Russian-born hacker selling 1.5m Facebook usernames,"A RUSSIAN-born hacker is attempting to sell Facebook IDs for as little as $25 per 100 usernames, social-media blog Mashable reports, citing researchers at VeriSign's iDefense.
-2010-76,"WHID 2010-76: Website hacked, election officials say","Local elections officials say their website was hacked as they tried to communicate the results of the Tuesday, May 4, primary election ??? crashing the site several times and delaying the announcement of vote tallies.
-2010-77,"WHID 2010-77: Kilpatrick's site down, spokesman suspects hackers","The New York City-based spokesman for Kwame Kilpatrick complained this afternoon that www.friendsofkwame.com is not working properly, and he suspects hackers.
-2010-78,WHID 2010-78: Butler County Election Website Hacked,"The Butler County Sheriff will investigate an alleged hacking incident that brought down election computers in that county last night, and slowed the reporting of votes.
-2010-79,WHID 2010-79: Italian expert: the attack of Romanian hackers against La Stampa and Corriere newspapers was the most relevant in the last eight years,"On April 30, a group of hackers, who sign as ""Romanian National Security"" attacked three of the most important media sites in Italy: La Stampa, Corriere della Sera and RAI. The Romanian hackers left a message inviting Italian journalists to avoid confusions between Romanians and gypsies.
-2010-7,"WHID 2010-7: Hacker attacks Ceridian; data from 27,000 at risk","A hacker attack at payroll processing firm Ceridian Corp. of Bloomington has potentially revealed the names, Social Security numbers, and, in some cases, the birth dates and bank accounts of 27,000 employees working at 1,900 companies nationwide. The attack was against the Powerpay payroll system.",http://www.startribune.com/business/83505102.html?elr=KArksUUUU,1/20/2010,SQL Injection,Improper Input Handling,Leakage of Information,Finance,"Minnesota, USA",No,,,,,,,27000,
-2010-80,WHID 2010-80: Hacked US Treasury websites serve visitors malware,"Updated Websites operated by the US Treasury Department are redirecting visitors to websites that attempt to install malware on their PCs, a security researcher warned on Monday.
-2010-81,WHID 2010-81: Network Solutions customers hit by mass hack attack,"Network Solutions' security team is battling a mysterious attack that has silently infected a ""huge"" number of the websites it hosts with malicious code.
-2010-82,"WHID 2010-82: Victorian councils, libraries taught security in hack","A hacker has busted the security of eight Victorian Government websites in a string of minor attacks on Sunday.
-2010-83,WHID 2010-83: High-profile tech blog is hacked,"High-profile technology blog TechCrunch has been taken offline by hackers.
-2010-84,WHID 2010-84: PHP Website XSS Defacement,"Cross-site scripting , html injection and redirect on bugs.php.net and phpbuilder.com
-2010-85,WHID 2010-85: Facebook flaw exposes live chats,"Facebook has again come under fire for not doing enough to protect personal information after a security flaw allowed users to eavesdrop on private chat sessions.
-2010-86,WHID 2010-86: China State News Agency Web Site Hit With Malware,"A section of the Web site for China's state-run Xinhua news agency was found to be distributing malware last month, according to a Google malware scanning service that is still labeling the site as potentially harmful.
-2010-87,WHID 2010-87: Facebook hacker jailed after falsely accusing boyfriend of rape,"A young mother who had accused her ex-boyfriend of rape hacked into his Facebook site to post a threat to herself to bolster her fakery.
-2010-88,WHID 2010-88: phpnuke.org has been compromised,"Websense?? Security Labs??? ThreatSeeker??? Network has discovered that the popular Web site, phpnuke.org, has been compromised.
-2010-89,WHID 2010-89: Breaking News: WordPress Hacked with Zettapetta on DreamHost,"Early this morning, we received reports that WordPress blogs were hacked on Linux shared-hosting at DreamHost, as well as other hosting companies. This is dangerous scareware which tries to install a virus on your visitor's computer.
-2010-8,WHID 2010-8: Cross-site scripting vulnerabilities see two political websites hacked,A report on BBC News said that visitors to Spain's EU presidency website were greeted by an image of comedy character Mr Bean instead of the Spanish Prime Minister Jose Luis Rodriguez Zapatero. The government said that the site - www.eu2010.es - had not been attacked and that a hacker had taken a screenshot of the homepage to make a photo montage using a cross-site scripting (XSS) vulnerability. Visitors found an image of Mr Bean complete with a benign smile and the words ???Hi there'.,http://www.scmagazineuk.com/cross-site-scripting-vulnerabilities-see-two-political-websites-hacked/article/160597/,1/5/2010,Cross Site Scripting (XSS),Improper Output Handling,Defacement,Government,Spain,No,,,,,,,,
-2010-90,WHID 2010-90: Facebook Board Member's Account Compromised,"A Facebook message sent out on Saturday from the account of company board member Jim Breyer to over 2,300 ""friends"" turns out to have been too good to be true.
-2010-91,WHID 2010-91: Twitter software bug forces followers,"Twitter users had a big shock on Monday when they checked into the micro-blogging service. Their follower and following numbers were at 0, meaning they were suddenly very unpopular or something was seriously wrong with the site.
-2010-92,"WHID 2010-92: SQL Injection attack used in breach of 168,000 Netherlands travelers","An attacker has discovered a serious flaw in a website set up to encourage the use of smart cards for public transportation in the Netherlands, resulting in the leakage of personal information of more than 168,000 travelers.
-2010-93,WHID 2010-93: Huge 'sexiest video ever' attack hits Facebook,"A huge attack by a rogue Facebook application last weekend infected users' PCs with popup-spewing adware, a security researcher said Monday.
-2010-94,"WHID 2010-94: Hacker steals 22,000 e-mail address, demands Astley tune","Dutch hacker Darkc0ke hijacked a radio station database containing 22,000 e-mail addresses and threatened to publish them unless the station play Rick Astley's ""Never Gonna Give You Up,"" a variation of an Internet meme known as ""rickrolling.""
-2010-95,WHID 2010-95: Fraud Bazaar Carders.cc Hacked,"Carders.cc, a German online forum dedicated to helping criminals trade and sell financial data stolen through hacking, has itself been hacked. The once-guarded contents of its servers are now being traded on public file-sharing networks, leading to the exposure of potentially identifying information on the forum???s users as well as countless passwords and credit card accounts swiped from unsuspecting victims.",http://krebsonsecurity.com/2010/05/fraud-bazaar-carders-cc-hacked/,5/18/2010,Misconfiguration,Improper Filesystem Permissions,Leakage of Information,Hacking,Germany,No,,,,,,,,
-2010-95,WHID 2010-95: Fraud Bazaar Carders.cc Hacked,"Carders.cc, a German online forum dedicated to helping criminals trade and sell financial data stolen through hacking, has itself been hacked. The once-guarded contents of its servers are now being traded on public file-sharing networks, leading to the exposure of potentially identifying information on the forum???s users as well as countless passwords and credit card accounts swiped from unsuspecting victims.",http://krebsonsecurity.com/2010/05/fraud-bazaar-carders-cc-hacked/,5/18/2010,Misconfiguration,Improper Filesystem Permissions,Leakage of Information,Hacking,Germany,No,,,,,,,,
-2010-96,WHID 2010-96: Facebook scrambles to close CSRF hole exposing private data,"Facebook engineers are finishing a patch for a critical vulnerability that exposed user birthdays and other sensitive data even when they were designated as private, a security researcher said Wednesday.
-2010-97,"WHID 2010-97: Microsoft files two lawsuits for ""click laundering""","Microsoft this week filed two lawsuits in federal court in Seattle against alleged perpetrators of a new, technologically advanced form of online advertising click fraud being dubbed ""click laundering.""
-2010-98,"WHID 2010-98: Man charged with attacking O'Reilly, Coulter websites","A former college student has been charged with using the school's computer network to control a botnet and launch distributed denial-of-service (DDoS) attacks against conservative websites belonging to Bill O'Reilly, Ann Coulter and Rudy Giuliani.",http://www.scmagazineus.com/man-charged-with-attacking-oreilly-coulter-websites/article/170524/,5/19/2010,Denial of Service,Insufficient Anti-automation,Downtime,Media,USA,No,,,USA,,,,,
-2010-98,"WHID 2010-98: Man charged with attacking O'Reilly, Coulter websites","A former college student has been charged with using the school's computer network to control a botnet and launch distributed denial-of-service (DDoS) attacks against conservative websites belonging to Bill O'Reilly, Ann Coulter and Rudy Giuliani.",http://www.scmagazineus.com/man-charged-with-attacking-oreilly-coulter-websites/article/170524/,5/19/2010,Denial of Service,Insufficient Anti-automation,Downtime,Media,USA,No,,,USA,,,,,
-2010-99,WHID 2010-99: Got an iTunes account? That's music to a cyber fraudster's ears,"Up to 125million people worldwide have accounts set up on the site.
-2010-9,WHID 2010-9: Pakistani cyber crime website hit by hacker who is able to access database,"Details of a political website, the Pakistani National Response Center for Cyber Crimes, part of the Federal Investigation Authority, being hacked has been reported when a sensitive site was hit by a hacker who managed to gain access to the email database.",http://www.scmagazineuk.com/pakistani-cyber-crime-website-hit-by-hacker-who-is-able-to-access-database/article/160969/,1/11/2010,SQL Injection,Improper Input Handling,Defacement,Government,Pakistan,No,,,,,,,,
-2011-100,WHID 2011-100: Banking Trojan gang busted by Finnish police,Updated Finnish police closed on investigation on Tuesday after arresting 17 people suspected of involvement in a banking Trojan scam used to siphon off hundreds of thousands of euros held in accounts with Nordea Bank.,http://www.theregister.co.uk/2011/05/10/finnish_banking_trojan_investigation/,5/10/2011,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,Sweden,,,,,,1.2 million Euros,,,
-2011-100,WHID 2011-100: Banking Trojan gang busted by Finnish police,Updated Finnish police closed on investigation on Tuesday after arresting 17 people suspected of involvement in a banking Trojan scam used to siphon off hundreds of thousands of euros held in accounts with Nordea Bank.,http://www.theregister.co.uk/2011/05/10/finnish_banking_trojan_investigation/,5/10/2011,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,Sweden,,,,,,1.2 million Euros,,,
-2011-101,WHID 2011-101: Fox.com hacked,"Hackers have broken into a Fox.com extranet site, designed as a repository of research statistics, programming details and ratings for clients and affiliates, and stolen the emails and passwords for hundreds of Fox Broadcasting employees.",http://www.politico.com/blogs/onmedia/0511/Foxcom_hacked.html,4/29/2011,Unknown,Unknown,Leakage of Information,News,USA,,,,,,,,,
-2011-101,WHID 2011-101: Fox.com hacked,"Hackers have broken into a Fox.com extranet site, designed as a repository of research statistics, programming details and ratings for clients and affiliates, and stolen the emails and passwords for hundreds of Fox Broadcasting employees.",http://www.politico.com/blogs/onmedia/0511/Foxcom_hacked.html,4/29/2011,Unknown,Unknown,Leakage of Information,News,USA,,,,,,,,,
-2011-102,WHID 2011-102: Group says its website calling for democracy protests in China was hacked,"A group that has issued calls for pro-democracy protests in China said its Google-hosted site was hacked Thursday, amid a far-reaching government crackdown on activists.",http://www.washingtonpost.com/world/group-says-its-website-calling-for-democracy-protests-in-china-was-hacked/2011/05/12/AFBAEtxG_story.html,5/12/2011,Unknown,Unknown,Data Loss,Hosting Providers,"Beijing, China",,,,,,,,,
-2011-102,WHID 2011-102: Group says its website calling for democracy protests in China was hacked,"A group that has issued calls for pro-democracy protests in China said its Google-hosted site was hacked Thursday, amid a far-reaching government crackdown on activists.",http://www.washingtonpost.com/world/group-says-its-website-calling-for-democracy-protests-in-china-was-hacked/2011/05/12/AFBAEtxG_story.html,5/12/2011,Unknown,Unknown,Data Loss,Hosting Providers,"Beijing, China",,,,,,,,,
-2011-103,WHID 2011-103: bianet. org Hit by Massive Cyber Attack,bianet.org became the target of a heavy cyber attack that started at 3.30 pm on Tuesday (18 May). Broadcasting was resumed at 11.20 pm after the attack has been continuing non-stop. This cyber attack was not related to a hacking attempt. Access to the bianet.org site was prevented due to a Distributed Denial-of-Service (DDoS) caused by a very large number of computers that were connected to the server at the same time. Our information suggests that this was an organized attack and that tens of thousands of computers were controlled for the attack via Trojans.,http://www.bianet.org/english/freedom-of-expression/130062-bianet-org-hit-by-massive-cyber-attack,5/18/2011,Denial of Service,Insufficient Anti-automation,Downtime,News,"Istanbul, Turkey",,,,,,,,,
-2011-103,WHID 2011-103: bianet. org Hit by Massive Cyber Attack,bianet.org became the target of a heavy cyber attack that started at 3.30 pm on Tuesday (18 May). Broadcasting was resumed at 11.20 pm after the attack has been continuing non-stop. This cyber attack was not related to a hacking attempt. Access to the bianet.org site was prevented due to a Distributed Denial-of-Service (DDoS) caused by a very large number of computers that were connected to the server at the same time. Our information suggests that this was an organized attack and that tens of thousands of computers were controlled for the attack via Trojans.,http://www.bianet.org/english/freedom-of-expression/130062-bianet-org-hit-by-massive-cyber-attack,5/18/2011,Denial of Service,Insufficient Anti-automation,Downtime,News,"Istanbul, Turkey",,,,,,,,,
-2011-104,WHID 2011-104: NASA website hacked,"Software scammers offering cheap Adobe software have hacked into numerous web pages of NASA, just days before its final launch of the shuttle Endeavor, and Stanford University.",http://articles.timesofindia.indiatimes.com/2011-05-11/internet/29531808_1_nasa-website-shuttle,5/11/2011,Unknown,Improper Output Handling,Link Spam,Government,USA,,,,,,,,,
-2011-104,WHID 2011-104: NASA website hacked,"Software scammers offering cheap Adobe software have hacked into numerous web pages of NASA, just days before its final launch of the shuttle Endeavor, and Stanford University.",http://articles.timesofindia.indiatimes.com/2011-05-11/internet/29531808_1_nasa-website-shuttle,5/11/2011,Unknown,Improper Output Handling,Link Spam,Government,USA,,,,,,,,,
-2011-105,WHID 2011-105: Hackers Take Over Twitter Accounts of Fox-Affiliates,"A group of hackers has gained access to a database of fox.com email accounts and last night took over the Twitter accounts of two Fox-affiliates: WFQX in Michigan???s Upper Peninsulas and KADN in Lafayette, LA. Calling itself Lulz Security, the group posted defamatory tweets under the accounts of WFQX and KADN and, using its own Twitter account (@LulzSec), has today been teasing future attacks. ???Lots of Facebook logins,??? the group tweeted this morning.",http://www.mediabistro.com/tvspy/hackers-take-over-twitter-accounts-of-fox-affiliates_b9977,5/10/2011,Stolen Credentials,Insufficient Authentication,Account Takeover,Web 2.0,USA,,,,,,,,,
-2011-105,WHID 2011-105: Hackers Take Over Twitter Accounts of Fox-Affiliates,"A group of hackers has gained access to a database of fox.com email accounts and last night took over the Twitter accounts of two Fox-affiliates: WFQX in Michigan???s Upper Peninsulas and KADN in Lafayette, LA. Calling itself Lulz Security, the group posted defamatory tweets under the accounts of WFQX and KADN and, using its own Twitter account (@LulzSec), has today been teasing future attacks. ???Lots of Facebook logins,??? the group tweeted this morning.",http://www.mediabistro.com/tvspy/hackers-take-over-twitter-accounts-of-fox-affiliates_b9977,5/10/2011,Stolen Credentials,Insufficient Authentication,Account Takeover,Web 2.0,USA,,,,,,,,,
-2011-106,WHID 2011-106: Final Fantasy maker Square Enix hacked,"Hackers have broken into two websites belonging to Japanese video games maker Square Enix. The company confirmed that the e-mail addresses of up to 25,000 customers who had registered for product updates may have been stolen as a result.",http://www.bbc.co.uk/news/technology-13394968,5/13/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,,,,,,,,,,
-2011-106,WHID 2011-106: Final Fantasy maker Square Enix hacked,"Hackers have broken into two websites belonging to Japanese video games maker Square Enix. The company confirmed that the e-mail addresses of up to 25,000 customers who had registered for product updates may have been stolen as a result.",http://www.bbc.co.uk/news/technology-13394968,5/13/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,,,,,,,,,,
-2011-107,WHID 2011-107: Geek.com Site Hacked Via Exploit Kit,"Hackers inserted malicious code on the first article on the Geek.com homepage, among others, the researchers say. ""As this is first article is highlighted --and 'Call of Duty' is a very popular game -- one can assume that many people have fallen victim to this attack,"" the blog says. The article was published on May 13th. and the malicious Iframe is injected at the bottom of the page, the researchers say.",http://www.darkreading.com/security/attacks-breaches/229500721/geek-com-site-hacked-via-exploit-kit.html,5/17/2011,Unknown,Improper Output Handling,Planting of Malware,Technology,USA,,,,,,,,,
-2011-107,WHID 2011-107: Geek.com Site Hacked Via Exploit Kit,"Hackers inserted malicious code on the first article on the Geek.com homepage, among others, the researchers say. ""As this is first article is highlighted --and 'Call of Duty' is a very popular game -- one can assume that many people have fallen victim to this attack,"" the blog says. The article was published on May 13th. and the malicious Iframe is injected at the bottom of the page, the researchers say.",http://www.darkreading.com/security/attacks-breaches/229500721/geek-com-site-hacked-via-exploit-kit.html,5/17/2011,Unknown,Improper Output Handling,Planting of Malware,Technology,USA,,,,,,,,,
-2011-108,WHID 2011-108: Teenagers prosecuted for hacking and bringing down web hosting company,"According to the Met, using the alias 'Colonel Root', Woodham hacked into web hosting company ???Punkyhosting' in April 2009. It detected the attack and made attempts to prevent it. In response, Woodham repeatedly attacked the company over a number of weeks, causing it to cease trading. He then sent a taunting email gloating about his actions.",http://www.scmagazineuk.com/teenagers-prosecuted-for-hacking-and-bringing-down-web-hosting-company/article/202997/,4/1/2009,Unknown,Unknown,Downtime,Hosting Providers,,,,,,,,,,
-2011-108,WHID 2011-108: Teenagers prosecuted for hacking and bringing down web hosting company,"According to the Met, using the alias 'Colonel Root', Woodham hacked into web hosting company ???Punkyhosting' in April 2009. It detected the attack and made attempts to prevent it. In response, Woodham repeatedly attacked the company over a number of weeks, causing it to cease trading. He then sent a taunting email gloating about his actions.",http://www.scmagazineuk.com/teenagers-prosecuted-for-hacking-and-bringing-down-web-hosting-company/article/202997/,4/1/2009,Unknown,Unknown,Downtime,Hosting Providers,,,,,,,,,,
-2011-109,WHID 2011-109: PCS Union website downed by ideological DDoS,"The prominent Public and Commercial and Services union (PCS) is struggling to get its website back online after being hit by a huge DDoS attack nearly a week ago. Government aside, sustained attacks against websites with a political theme are extremely rare in UK, and what has befallen the PCS ??? whose members include large numbers of public sector and government workers - could rank as the first time the country has seen a large-scale ideological attack of this kind. Starting on 11 May, the union???s website was hit by traffic 1,000 times its normal level, taking the site down. As of 16 May, the site is still unavailable beyond a static homepage that announces the problem, with a fix unlikely for at least a day or two.",http://www.computerworlduk.com/news/public-sector/3280224/pcs-union-website-downed-by-ideological-ddos/,5/17/2011,Denial of Service,Insufficient Anti-automation,Downtime,Politics,United Kingdom,,,,,,,,,
-2011-109,WHID 2011-109: PCS Union website downed by ideological DDoS,"The prominent Public and Commercial and Services union (PCS) is struggling to get its website back online after being hit by a huge DDoS attack nearly a week ago. Government aside, sustained attacks against websites with a political theme are extremely rare in UK, and what has befallen the PCS ??? whose members include large numbers of public sector and government workers - could rank as the first time the country has seen a large-scale ideological attack of this kind. Starting on 11 May, the union???s website was hit by traffic 1,000 times its normal level, taking the site down. As of 16 May, the site is still unavailable beyond a static homepage that announces the problem, with a fix unlikely for at least a day or two.",http://www.computerworlduk.com/news/public-sector/3280224/pcs-union-website-downed-by-ideological-ddos/,5/17/2011,Denial of Service,Insufficient Anti-automation,Downtime,Politics,United Kingdom,,,,,,,,,
-2011-10,WHID 2011-10: US Hospital Server Hacked by ???Call of Duty: Black Op???s??? Fans,"Seacoast Radiology in Rochester, New Hampshire, announced last week it had informed over 231,000 patients that their details were accessed after their server was hacked back in November.
-2011-110,WHID 2011-110: Facebook Fails to Stop Spammers... Again,"Facebook has recently launched new security features to block spam, but merely after its inception, tons of new ones have emerged, bypassing these security implementations.",http://tech2.in.com/news/social-networking/facebook-spammers-bypassing-new-security-features/219322,5/17/2011,Clickjacking,Application Misconfiguration,Link Spam,Web 2.0,,,,,,,,,,
-2011-110,WHID 2011-110: Facebook Fails to Stop Spammers... Again,"Facebook has recently launched new security features to block spam, but merely after its inception, tons of new ones have emerged, bypassing these security implementations.",http://tech2.in.com/news/social-networking/facebook-spammers-bypassing-new-security-features/219322,5/17/2011,Clickjacking,Application Misconfiguration,Link Spam,Web 2.0,,,,,,,,,,
-2011-111,WHID 2011-111: Hacker steals customer data from small brokerage,"An unidentified hacker has broken into the computer system of a small South Korean brokerage house to steal the firm's customer data, the financial regulator said Thursday, adding concerns over financial firms' computer security maintenance. The Financial Supervisory Service (FSS) said the hacker infiltrated the computer server of Leading Investment & Securities Co. and stole 12,000 customers' personal data last week. The stolen data includes their names, social security numbers, addresses and phone numbers, it said.",http://english.yonhapnews.co.kr/business/2011/05/19/85/0503000000AEN20110519004500320F.HTML,5/19/2011,SQL Injection,Improper Input Handling,Leakage of Information,Finance,"Seoul, South Korea",,,,,,,,,
-2011-111,WHID 2011-111: Hacker steals customer data from small brokerage,"An unidentified hacker has broken into the computer system of a small South Korean brokerage house to steal the firm's customer data, the financial regulator said Thursday, adding concerns over financial firms' computer security maintenance. The Financial Supervisory Service (FSS) said the hacker infiltrated the computer server of Leading Investment & Securities Co. and stole 12,000 customers' personal data last week. The stolen data includes their names, social security numbers, addresses and phone numbers, it said.",http://english.yonhapnews.co.kr/business/2011/05/19/85/0503000000AEN20110519004500320F.HTML,5/19/2011,SQL Injection,Improper Input Handling,Leakage of Information,Finance,"Seoul, South Korea",,,,,,,,,
-2011-112,WHID 2011-112: Hackers breach Sony's password reset system,"Sony's PlayStation Network is under fire again, with a new security breach hitting the beleaguered company. Just days after the network was resurrected following a massive data breach, there is mounting evidence that hackers have circumvented protections put in place via a password reset page. According to the Nyleveia gaming website, hackers have discovered an exploit that allows them to change user passwords using only a PlayStation Network account email and date of birth - information which could have been harvested during the recent attack.","http://www.pcauthority.com.au/News/257912,hackers-breach-sonys-password-reset-system.aspx",5/19/2011,Stolen Credentials,Insufficient Password Recovery,Account Takeover,Entertainment,Japan,,,,,,,,,
-2011-112,WHID 2011-112: Hackers breach Sony's password reset system,"Sony's PlayStation Network is under fire again, with a new security breach hitting the beleaguered company. Just days after the network was resurrected following a massive data breach, there is mounting evidence that hackers have circumvented protections put in place via a password reset page. According to the Nyleveia gaming website, hackers have discovered an exploit that allows them to change user passwords using only a PlayStation Network account email and date of birth - information which could have been harvested during the recent attack.","http://www.pcauthority.com.au/News/257912,hackers-breach-sonys-password-reset-system.aspx",5/19/2011,Stolen Credentials,Insufficient Password Recovery,Account Takeover,Entertainment,Japan,,,,,,,,,
-2011-113,WHID 2011-113: French Anti-piracy Agency Hit By A Simple Hack,The French battle against illegal file sharers suffers a setback as its surveillance agency TMG is hacked,http://www.eweekeurope.co.uk/news/french-anti-piracy-agency-hit-by-a-simple-hack-29557,5/18/2011,Predictable Resource Location,Insufficient Authorization,Leakage of Information,Government,France,,,,,,,,,
-2011-113,WHID 2011-113: French Anti-piracy Agency Hit By A Simple Hack,The French battle against illegal file sharers suffers a setback as its surveillance agency TMG is hacked,http://www.eweekeurope.co.uk/news/french-anti-piracy-agency-hit-by-a-simple-hack-29557,5/18/2011,Predictable Resource Location,Insufficient Authorization,Leakage of Information,Government,France,,,,,,,,,
-2011-114,WHID 2011-114: Civil-service union hit by invisible DDoS is back up,"The attack started on Wednesday 11 May and left the website ""struggling to cope with average hourly traffic 1,000 times greater than normal,"" according to the union. Curiously, the attack failed to hit the radar screens of Arbor Networks, the firm that supplies traffic management and DDoS mitigation tools to the vast majority of the world's biggest telcos",http://www.theregister.co.uk/2011/05/18/pcs_ddos_folow_up/,5/18/2011,Denial of Service,Insufficient Anti-automation,Downtime,Politics,United Kingdom,,,,,,,,,
-2011-114,WHID 2011-114: Civil-service union hit by invisible DDoS is back up,"The attack started on Wednesday 11 May and left the website ""struggling to cope with average hourly traffic 1,000 times greater than normal,"" according to the union. Curiously, the attack failed to hit the radar screens of Arbor Networks, the firm that supplies traffic management and DDoS mitigation tools to the vast majority of the world's biggest telcos",http://www.theregister.co.uk/2011/05/18/pcs_ddos_folow_up/,5/18/2011,Denial of Service,Insufficient Anti-automation,Downtime,Politics,United Kingdom,,,,,,,,,
-2011-115,WHID 2011-115: Facebook privacy vulnerability,"The privacy vulnerability, which can affect all Facebook users if a hacker has enough time, allows for privacy-protected photos to be accessed without being the user's ""friend"". Read more: http://www.smh.com.au/technology/security/security-experts-go-to-war-wife-targeted-20110517-1eqsm.html#ixzz1O2AO9MCX",http://www.smh.com.au/technology/security/security-experts-go-to-war-wife-targeted-20110517-1eqsm.html,5/17/2011,Predictable Resource Location,Insufficient Authorization,Leakage of Information,Web 2.0,USA,,,,,,,,,
-2011-115,WHID 2011-115: Facebook privacy vulnerability,"The privacy vulnerability, which can affect all Facebook users if a hacker has enough time, allows for privacy-protected photos to be accessed without being the user's ""friend"". Read more: http://www.smh.com.au/technology/security/security-experts-go-to-war-wife-targeted-20110517-1eqsm.html#ixzz1O2AO9MCX",http://www.smh.com.au/technology/security/security-experts-go-to-war-wife-targeted-20110517-1eqsm.html,5/17/2011,Predictable Resource Location,Insufficient Authorization,Leakage of Information,Web 2.0,USA,,,,,,,,,
-2011-116,WHID 2011-116: New attack vector in DDoS observed,We described above a new way of the Denial of Ser?_vice attack. We do believe this method of the attack poses an increased risk to all the DNS servers as there are no pro?_tec?_tive coun?_ter?_mea?_sures avail?_able. The seri?_ous?_ness of the sit?_u?_a?_tion is under?_lined with the fact that this kind of attack was observed on the Inter?_net as fully working.,http://www.zone-h.org/news/id/4739,5/19/2011,Denial of Service,Insufficient Anti-automation,Downtime,Multiple,USA,,,,,,,,,
-2011-116,WHID 2011-116: New attack vector in DDoS observed,We described above a new way of the Denial of Ser?_vice attack. We do believe this method of the attack poses an increased risk to all the DNS servers as there are no pro?_tec?_tive coun?_ter?_mea?_sures avail?_able. The seri?_ous?_ness of the sit?_u?_a?_tion is under?_lined with the fact that this kind of attack was observed on the Inter?_net as fully working.,http://www.zone-h.org/news/id/4739,5/19/2011,Denial of Service,Insufficient Anti-automation,Downtime,Multiple,USA,,,,,,,,,
-2011-117,WHID 2011-117: Colombia's Senate website hacked,"Colombian hacker collective ""Anonymous"" hacked the website of the country's Senate Friday, replacing the page with an alternative website protesting a new law regarding internet copyright.",http://colombiareports.com/colombia-news/news/16402-colombias-senate-website-hacked.html,5/20/2011,Unknown,Improper Output Handling,Defacement,Government,Columbia,,,,,,,,,
-2011-117,WHID 2011-117: Colombia's Senate website hacked,"Colombian hacker collective ""Anonymous"" hacked the website of the country's Senate Friday, replacing the page with an alternative website protesting a new law regarding internet copyright.",http://colombiareports.com/colombia-news/news/16402-colombias-senate-website-hacked.html,5/20/2011,Unknown,Improper Output Handling,Defacement,Government,Columbia,,,,,,,,,
-2011-118,WHID 2011-118: Online Intruder Broke Into Sony Internet Subsidiary's User Accounts,"So-net Entertainment Corp., an Internet service provider subsidiary of Sony Corp. (6758.TO, SNE), said an online intruder accessed its customer rewards site earlier this week and stole customers' redeemable gift points worth about 100,000 yen ($1,225). Read more: http://www.foxbusiness.com/industries/2011/05/20/online-intruder-broke-sony-internet-subsidiarys-user-accounts/#ixzz1O2GNDqzB",http://www.foxbusiness.com/industries/2011/05/20/online-intruder-broke-sony-internet-subsidiarys-user-accounts/,5/20/2011,Brute Force,Insufficient Anti-automation,Monetary Loss,Entertainment,"Tokyo, Japan",,,,,,,,,
-2011-118,WHID 2011-118: Online Intruder Broke Into Sony Internet Subsidiary's User Accounts,"So-net Entertainment Corp., an Internet service provider subsidiary of Sony Corp. (6758.TO, SNE), said an online intruder accessed its customer rewards site earlier this week and stole customers' redeemable gift points worth about 100,000 yen ($1,225). Read more: http://www.foxbusiness.com/industries/2011/05/20/online-intruder-broke-sony-internet-subsidiarys-user-accounts/#ixzz1O2GNDqzB",http://www.foxbusiness.com/industries/2011/05/20/online-intruder-broke-sony-internet-subsidiarys-user-accounts/,5/20/2011,Brute Force,Insufficient Anti-automation,Monetary Loss,Entertainment,"Tokyo, Japan",,,,,,,,,
-2011-119,WHID 2011-119: Sony site used for phishing,"Sony has been hacked, and one of its servers used to host a phishing site, according to Finnish company F-Secure.",http://www.zdnet.co.uk/blogs/security-bullet-in-10000166/sony-site-used-for-phishing-10022513/,5/20/2011,Unknown,Improper Output Handling,Phishing,Entertainment,"Tokyo, Japan",,,,,,,,,
-2011-119,WHID 2011-119: Sony site used for phishing,"Sony has been hacked, and one of its servers used to host a phishing site, according to Finnish company F-Secure.",http://www.zdnet.co.uk/blogs/security-bullet-in-10000166/sony-site-used-for-phishing-10022513/,5/20/2011,Unknown,Improper Output Handling,Phishing,Entertainment,"Tokyo, Japan",,,,,,,,,
-2011-11,"WHID 2011-11: Educational, government and military sites hit by hackers","A software security issue with a popular US-based web hosting provider is reportedly allowing hackers to secretly add dozens of web pages to military, educational, financial and government sites in a bid to promote so-called pharma retailing sites.",http://www.infosecurity-magazine.com/view/15209/educational-government-and-military-sites-hit-by-hackers/,1/17/2011,Known Vulnerability,Application Misconfiguration,Link Spam,Hosting Providers,Utah,No,,,,cPanel,,,,
-2011-120,WHID 2011-120: Nepal Government???s official Website Hacked,It has been reported that the official website of Nepal Government (http://www.nepalgov.gov.np/) has been hacked by anonymous group #OpEverest using the Denial of Service attack.,http://www.groundreport.com/Media_and_Tech/Nepal-Government-s-official-Website-Hacked/2939137,5/22/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,Nepal,,,,,,,,,
-2011-120,WHID 2011-120: Nepal Government???s official Website Hacked,It has been reported that the official website of Nepal Government (http://www.nepalgov.gov.np/) has been hacked by anonymous group #OpEverest using the Denial of Service attack.,http://www.groundreport.com/Media_and_Tech/Nepal-Government-s-official-Website-Hacked/2939137,5/22/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,Nepal,,,,,,,,,
-2011-121,WHID 2011-121: State highway police website hacked,"The state highway police's website was allegedly hacked by an unknown person, who changed the accident figures to show a steep decline in the number of deaths for the year 2010.",http://www.hindustantimes.com/State-highway-police-website-hacked/Article1-700790.aspx,5/23/2011,Unknown,Unknown,Disinformation,Government,"New Delhi, India",,,,,,,,,
-2011-121,WHID 2011-121: State highway police website hacked,"The state highway police's website was allegedly hacked by an unknown person, who changed the accident figures to show a steep decline in the number of deaths for the year 2010.",http://www.hindustantimes.com/State-highway-police-website-hacked/Article1-700790.aspx,5/23/2011,Unknown,Unknown,Disinformation,Government,"New Delhi, India",,,,,,,,,
-2011-122,WHID 2011-122: Sony BMG Greece the latest hacked Sony site,"In what seems to be a neverending nightmare it appears that the website of Sony BMG in Greece has been hacked and information dumped. An anonymous poster has uploaded a user database to pastebin.com, including the usernames, real names and email addresses of users registered on SonyMusic.gr.",http://nakedsecurity.sophos.com/2011/05/22/sony-bmg-greece-the-latest-hacked-sony-site/,5/22/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,Greece,,,,,,,,,
-2011-122,WHID 2011-122: Sony BMG Greece the latest hacked Sony site,"In what seems to be a neverending nightmare it appears that the website of Sony BMG in Greece has been hacked and information dumped. An anonymous poster has uploaded a user database to pastebin.com, including the usernames, real names and email addresses of users registered on SonyMusic.gr.",http://nakedsecurity.sophos.com/2011/05/22/sony-bmg-greece-the-latest-hacked-sony-site/,5/22/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,Greece,,,,,,,,,
-2011-123,WHID 2011-123: Thai Democrat website hacked,"A website of the Democrat Party, set up to attract young people, was hacked on Sunday ni",http://www.bangkokpost.com/news/politics/238438/democrat-website-hacked,5/23/2011,Unknown,Improper Output Handling,Defacement,Government,"Bangkok, Thailand",,,,,,,,,
-2011-123,WHID 2011-123: Thai Democrat website hacked,"A website of the Democrat Party, set up to attract young people, was hacked on Sunday ni",http://www.bangkokpost.com/news/politics/238438/democrat-website-hacked,5/23/2011,Unknown,Improper Output Handling,Defacement,Government,"Bangkok, Thailand",,,,,,,,,
-2011-124,WHID 2011-124: Hackers target student group websites,"everal Stanford websites were taken offline May 9 after being targeted by hackers looking to sell cheap software. The affected sites, currently offline and inaccessible, are those for the Stanford Concert Network, the Green Alliance for Innovative Action and the ASSU.",http://www.stanforddaily.com/2011/05/23/hackers-target-student-group-websites/,5/23/2011,Unknown,Improper Output Handling,Link Spam,Education,"Stanford, WA",,,,,,,,,
-2011-124,WHID 2011-124: Hackers target student group websites,"everal Stanford websites were taken offline May 9 after being targeted by hackers looking to sell cheap software. The affected sites, currently offline and inaccessible, are those for the Stanford Concert Network, the Green Alliance for Innovative Action and the ASSU.",http://www.stanforddaily.com/2011/05/23/hackers-target-student-group-websites/,5/23/2011,Unknown,Improper Output Handling,Link Spam,Education,"Stanford, WA",,,,,,,,,
-2011-125,WHID 2011-125: TrafficShop.com Experiencing DDoS Attack,"TrafficShop.com is currently experiencing a denial-of-service attack, according to the site???s sales manager, Chris 2.0. The perpetrators of the attack are unknown at this time but attempts to access the site result in a white screen.",http://news.avn.com/articles/TrafficShop-com-Experiencing-DDoS-Attack-436445.html,5/23/2011,Denial of Service,Insufficient Anti-automation,Downtime,Retail,Netherlands,,,,,,,,,
-2011-125,WHID 2011-125: TrafficShop.com Experiencing DDoS Attack,"TrafficShop.com is currently experiencing a denial-of-service attack, according to the site???s sales manager, Chris 2.0. The perpetrators of the attack are unknown at this time but attempts to access the site result in a white screen.",http://news.avn.com/articles/TrafficShop-com-Experiencing-DDoS-Attack-436445.html,5/23/2011,Denial of Service,Insufficient Anti-automation,Downtime,Retail,Netherlands,,,,,,,,,
-2011-126,WHID 2011-126: New hack on Comodo reseller exposes private data,Yet another official reseller of SSL certificate authority Comodo has suffered a security breach that allowed attackers to gain unauthorized access to data. Brazil-based ComodoBR is at least the fourth Comodo partner to be compromised this year.,http://www.theregister.co.uk/2011/05/24/comodo_reseller_hacked/,5/24/2011,SQL Injection,Improper Input Handling,Leakage of Information,Technology,"Lansing, MI",,,,,,,,,
-2011-126,WHID 2011-126: New hack on Comodo reseller exposes private data,Yet another official reseller of SSL certificate authority Comodo has suffered a security breach that allowed attackers to gain unauthorized access to data. Brazil-based ComodoBR is at least the fourth Comodo partner to be compromised this year.,http://www.theregister.co.uk/2011/05/24/comodo_reseller_hacked/,5/24/2011,SQL Injection,Improper Input Handling,Leakage of Information,Technology,"Lansing, MI",,,,,,,,,
-2011-127,"WHID 2011-127: Sony says hacker stole 2,000 records from Canadian site","The problems keep coming for Sony. On Tuesday the company confirmed that someone had hacked into its website and stolen about 2,000 customer names and e-mail addresses. Close to 1,000 of the records have already been posted online by a hacker calling himself Idahc, who says he's a ""Lebanese grey-hat hacker."" Idahc found a common Web programming error, called an SQL injection flaw, that allowed him to dig up the records on the Canadian version of the Official Sony Ericsson eShop, an online store for mobile phones and accessories.",http://www.computerworld.com/s/article/9217028/Sony_says_hacker_stole_2_000_records_from_Canadian_site?taxonomyId=140,5/24/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,Canada,,,,,,,,,
-2011-127,"WHID 2011-127: Sony says hacker stole 2,000 records from Canadian site","The problems keep coming for Sony. On Tuesday the company confirmed that someone had hacked into its website and stolen about 2,000 customer names and e-mail addresses. Close to 1,000 of the records have already been posted online by a hacker calling himself Idahc, who says he's a ""Lebanese grey-hat hacker."" Idahc found a common Web programming error, called an SQL injection flaw, that allowed him to dig up the records on the Canadian version of the Official Sony Ericsson eShop, an online store for mobile phones and accessories.",http://www.computerworld.com/s/article/9217028/Sony_says_hacker_stole_2_000_records_from_Canadian_site?taxonomyId=140,5/24/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,Canada,,,,,,,,,
-2011-128,WHID 2011-128: Hackers Steal Hotmail Messages Thanks to Web Flaw,"Criminals recently spent more than a week siphoning e-mail messages from Hotmail users' accounts, thanks to a programming bug in Microsoft's website.",http://www.pcworld.com/businesscenter/article/228609/hackers_steal_hotmail_messages_thanks_to_web_flaw.html,5/24/2011,Cross Site Request Forgery (CSRF),Insufficient Process Validation,Leakage of Information,Hosting Providers,"Redmond, WA",,,,,,,,,
-2011-128,WHID 2011-128: Hackers Steal Hotmail Messages Thanks to Web Flaw,"Criminals recently spent more than a week siphoning e-mail messages from Hotmail users' accounts, thanks to a programming bug in Microsoft's website.",http://www.pcworld.com/businesscenter/article/228609/hackers_steal_hotmail_messages_thanks_to_web_flaw.html,5/24/2011,Cross Site Request Forgery (CSRF),Insufficient Process Validation,Leakage of Information,Hosting Providers,"Redmond, WA",,,,,,,,,
-2011-129,WHID 2011-129: Anonymous Targets US Chamber of Commerce,Hactivist collective launches DDoS attack against the business lobbying group over it???s support for the legislation to fight online infringement that many fear will great expand the govt???s ability to filter the Internet.,http://www.zeropaid.com/news/93531/anonymous-targets-us-chamber-of-commerce-for-protect-ip-act/,5/24/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Richmond, Canada",,,,,,,,,
-2011-129,WHID 2011-129: Anonymous Targets US Chamber of Commerce,Hactivist collective launches DDoS attack against the business lobbying group over it???s support for the legislation to fight online infringement that many fear will great expand the govt???s ability to filter the Internet.,http://www.zeropaid.com/news/93531/anonymous-targets-us-chamber-of-commerce-for-protect-ip-act/,5/24/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Richmond, Canada",,,,,,,,,
-2011-12,WHID 2011-12: Cyber Criminals Attack A Hundred Online Casino Sites,"A South Korean web hosting company that allegedly hosted an illegal gambling site is in trouble with authorities for organising a series of ???cyber attacks??? on competing illegal online casinos in order to grab gambling business from rival gangsters.
-2011-130,WHID 2011-130: NIIT Technologies GIS subsidiary???s server hacked,"A server belonging to NIIT GIS Limited, an NIIT Technologies subsidiary, was compromised last week using a SQL injection attack by a hacking group calling itself the ???Tigers of Indian Cyber??? (TIC). TIC posted the disclosure in an open security forum giving proof of concept, and a complete list of account credentials. It has since come to light that NIIT GIS??? server was compromised ??? not the servers at NIIT Technologies.",http://searchsecurity.techtarget.in/news/2240036131/NIIT-Technologies-GIS-subsidiarys-server-hacked,5/25/2011,SQL Injection,Improper Input Handling,Leakage of Information,Technology,USA,,,,,,,,,
-2011-130,WHID 2011-130: NIIT Technologies GIS subsidiary???s server hacked,"A server belonging to NIIT GIS Limited, an NIIT Technologies subsidiary, was compromised last week using a SQL injection attack by a hacking group calling itself the ???Tigers of Indian Cyber??? (TIC). TIC posted the disclosure in an open security forum giving proof of concept, and a complete list of account credentials. It has since come to light that NIIT GIS??? server was compromised ??? not the servers at NIIT Technologies.",http://searchsecurity.techtarget.in/news/2240036131/NIIT-Technologies-GIS-subsidiarys-server-hacked,5/25/2011,SQL Injection,Improper Input Handling,Leakage of Information,Technology,USA,,,,,,,,,
-2011-131,WHID 2011-131: Hackers Compromise Sony Music Japan,"On the weekend, it was Sony BMG Greece that was compromised and today, it was Sony Music Japan. Unfortunately, Sony didn???t learn from the BMG Greece issue as the same exploit, an SQL injection flaw was used to compromise Sony Music Japan. At this time, there is no indication of any data being compromised or stolen. The folks that were able to perform this exploit was Lulz Security, a group of hackers whose self proclaimed mission is to identify and highlight security flaws in networks.",http://www.coated.com/hackers-compromise-sony-music-japan/,5/25/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,"Tokyo, Japan",,,,,,,,,
-2011-131,WHID 2011-131: Hackers Compromise Sony Music Japan,"On the weekend, it was Sony BMG Greece that was compromised and today, it was Sony Music Japan. Unfortunately, Sony didn???t learn from the BMG Greece issue as the same exploit, an SQL injection flaw was used to compromise Sony Music Japan. At this time, there is no indication of any data being compromised or stolen. The folks that were able to perform this exploit was Lulz Security, a group of hackers whose self proclaimed mission is to identify and highlight security flaws in networks.",http://www.coated.com/hackers-compromise-sony-music-japan/,5/25/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,"Tokyo, Japan",,,,,,,,,
-2011-132,WHID 2011-132: Turkish Online News Sites Face Cyber-attack,"Recently, several Turkish online news portals suffered cyber-attack. The website of Birgun, a left-wing daily newspaper operated from Istanbul was the first news portal to suffer cyber-attack.",http://www.release-news.com/index.php/technology/112749-turkish-online-news-sites-face-cyber-attack.html,5/25/2011,Denial of Service,Insufficient Anti-automation,Downtime,News,Turkey,,,,,,,,,
-2011-132,WHID 2011-132: Turkish Online News Sites Face Cyber-attack,"Recently, several Turkish online news portals suffered cyber-attack. The website of Birgun, a left-wing daily newspaper operated from Istanbul was the first news portal to suffer cyber-attack.",http://www.release-news.com/index.php/technology/112749-turkish-online-news-sites-face-cyber-attack.html,5/25/2011,Denial of Service,Insufficient Anti-automation,Downtime,News,Turkey,,,,,,,,,
-2011-133,WHID 2011-133: Nigerian government agency website hacked by ???Cyberhacktivists???,"A group of Nigerian hackers who call themselves ???Naija Cyber Hacktivists??? broke into the Niger Delta Development Committee???s website, a Nigerian agency set up to develop the region, yesterday.",http://thenextweb.com/africa/2011/05/26/nigerian-government-agency-website-hacked-by-cyberhacktivists/,5/26/2011,Unknown,Improper Output Handling,Defacement,Government,Nigeria,,,,,,,,,
-2011-133,WHID 2011-133: Nigerian government agency website hacked by ???Cyberhacktivists???,"A group of Nigerian hackers who call themselves ???Naija Cyber Hacktivists??? broke into the Niger Delta Development Committee???s website, a Nigerian agency set up to develop the region, yesterday.",http://thenextweb.com/africa/2011/05/26/nigerian-government-agency-website-hacked-by-cyberhacktivists/,5/26/2011,Unknown,Improper Output Handling,Defacement,Government,Nigeria,,,,,,,,,
-2011-134,WHID 2011-134: Codemasters Admits Weekend Hack Attack,"Codemasters, best known as the publisher of the Operation Flashpoint and Grid games, acknowledged to GamesIndustry that hackers were able to breach its security on May 20 and gain access to user data, which was then posted online.",http://www.escapistmagazine.com/news/view/110400-Codemasters-Admits-Weekend-Hack-Attack,5/20/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,United Kingdom,,,,,,,,,
-2011-134,WHID 2011-134: Codemasters Admits Weekend Hack Attack,"Codemasters, best known as the publisher of the Operation Flashpoint and Grid games, acknowledged to GamesIndustry that hackers were able to breach its security on May 20 and gain access to user data, which was then posted online.",http://www.escapistmagazine.com/news/view/110400-Codemasters-Admits-Weekend-Hack-Attack,5/20/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,United Kingdom,,,,,,,,,
-2011-135,WHID 2011-135: Hackers steal owner data from Honda,Honda Canada has informed thousands of its Honda and Acura customers that some of their personal information was stolen when its systems were hacked.,http://www.cbc.ca/news/technology/story/2011/05/27/honda-hackers-data.html,5/27/2011,SQL Injection,Improper Input Handling,Leakage of Information,Automotive,"Toronto, Canada",,,,,,,,,
-2011-135,WHID 2011-135: Hackers steal owner data from Honda,Honda Canada has informed thousands of its Honda and Acura customers that some of their personal information was stolen when its systems were hacked.,http://www.cbc.ca/news/technology/story/2011/05/27/honda-hackers-data.html,5/27/2011,SQL Injection,Improper Input Handling,Leakage of Information,Automotive,"Toronto, Canada",,,,,,,,,
-2011-136,WHID 2011-136: Apple under fire as hacked iTunes complaints swell,"Apple is facing mounting criticism as a possible iTunes hack attack has seen customers' gift certificate accounts drained.
-2011-137,"WHID 2011-137: Hacked PBS reports Tupac, Biggie alive","Hacking group LulzSec broke into the site after it cracked the security on the media stalwart website, and obtained access credentials held in databases.","http://www.scmagazine.com.au/News/258976,hacked-pbs-reports-tupac-biggie-alive.aspx",5/30/2011,SQL Injection,Improper Input Handling,Leakage of Information,News,"Arlington, VA",,,,,,,,,
-2011-137,"WHID 2011-137: Hacked PBS reports Tupac, Biggie alive","Hacking group LulzSec broke into the site after it cracked the security on the media stalwart website, and obtained access credentials held in databases.","http://www.scmagazine.com.au/News/258976,hacked-pbs-reports-tupac-biggie-alive.aspx",5/30/2011,SQL Injection,Improper Input Handling,Leakage of Information,News,"Arlington, VA",,,,,,,,,
-2011-138,WHID 2011-138: 'Dark forces' attack Chinese leftist website in resurgent culture war,"The flagship website of China's resurgent New Left movement was brought down by hackers yesterday, interrupting its ferocious campaign against critics of Chairman Mao Zedong. Read more: http://www.smh.com.au/technology/security/dark-forces-attack-chinese-leftist-website-in-resurgent-culture-war-20110531-1fere.html#ixzz1O3stL6am",http://www.smh.com.au/technology/security/dark-forces-attack-chinese-leftist-website-in-resurgent-culture-war-20110531-1fere.html,6/1/2011,Denial of Service,Insufficient Anti-automation,Downtime,Politics,"Beijing, China",,,,,,,,,
-2011-138,WHID 2011-138: 'Dark forces' attack Chinese leftist website in resurgent culture war,"The flagship website of China's resurgent New Left movement was brought down by hackers yesterday, interrupting its ferocious campaign against critics of Chairman Mao Zedong. Read more: http://www.smh.com.au/technology/security/dark-forces-attack-chinese-leftist-website-in-resurgent-culture-war-20110531-1fere.html#ixzz1O3stL6am",http://www.smh.com.au/technology/security/dark-forces-attack-chinese-leftist-website-in-resurgent-culture-war-20110531-1fere.html,6/1/2011,Denial of Service,Insufficient Anti-automation,Downtime,Politics,"Beijing, China",,,,,,,,,
-2011-139,WHID 2011-139: DILG website still down,"The Department of Interior and Local Government's (DILG's) website is still down as of Wednesday morning, following a hack on Tuesday that led the site to display the logo of a porn site as one of its ""news items"".",http://www.gmanews.tv/story/222221/technology/dilg-website-hacked,6/1/2011,Unknown,Improper Output Handling,Defacement,Government,"Makati, PH",,,,,,,,,
-2011-139,WHID 2011-139: DILG website still down,"The Department of Interior and Local Government's (DILG's) website is still down as of Wednesday morning, following a hack on Tuesday that led the site to display the logo of a porn site as one of its ""news items"".",http://www.gmanews.tv/story/222221/technology/dilg-website-hacked,6/1/2011,Unknown,Improper Output Handling,Defacement,Government,"Makati, PH",,,,,,,,,
-2011-13,WHID 2011-13: Hackers deface IBM DeveloperWorks website,"An IBM site for developers was defaced over the weekend, with attackers replacing some of the web pages on the site with ones containing their own messages, IBM confirmed Monday.",http://www.cio.co.uk/news/3256323/hackers-deface-ibm-developerworks-website/,1/11/2011,Unknown,Unknown,Defacement,Technology,USA,No,,,,,,,,
-2011-13,WHID 2011-13: Hackers deface IBM DeveloperWorks website,"An IBM site for developers was defaced over the weekend, with attackers replacing some of the web pages on the site with ones containing their own messages, IBM confirmed Monday.",http://www.cio.co.uk/news/3256323/hackers-deface-ibm-developerworks-website/,1/11/2011,Unknown,Unknown,Defacement,Technology,USA,No,,,,,,,,
-2011-140,WHID 2011-140: Scammers targeting dealers??? Auto Trader accounts and ripping off buyers,Several dealers have been in touch with Car Dealer with tales of woe after their accounts with the online classified website were compromised.,http://www.cardealermagazine.co.uk/publish/scammers-targeting-dealers-auto-trader-accounts-and-ripping-off-buyers/52641,6/2/2011,Unknown,Unknown,Disinformation,Automotive,"Overland Park, KS",,,,,,,,,
-2011-140,WHID 2011-140: Scammers targeting dealers??? Auto Trader accounts and ripping off buyers,Several dealers have been in touch with Car Dealer with tales of woe after their accounts with the online classified website were compromised.,http://www.cardealermagazine.co.uk/publish/scammers-targeting-dealers-auto-trader-accounts-and-ripping-off-buyers/52641,6/2/2011,Unknown,Unknown,Disinformation,Automotive,"Overland Park, KS",,,,,,,,,
-2011-141,WHID 2011-141: Google says Chinese hackers broke into Gmail,"Computer hackers in China broke into the Gmail accounts of several hundred people, including senior U.S. government officials, military personnel and political activists, Google Inc. said Wednesday.",http://www.huffingtonpost.com/huff-wires/20110601/us-tec-google-hacking-attack/,6/1/2011,Cross Site Request Forgery (CSRF),Insufficient Process Validation,Account Takeover,Hosting Providers,"Mountain View, CA",,,,,,,,,http://www.eweek.com/c/a/Security/Adobe-Patches-XSS-ZeroDay-Flaw-in-Flash-Used-in-Google-Gmail-Attack-166249/
-2011-141,WHID 2011-141: Google says Chinese hackers broke into Gmail,"Computer hackers in China broke into the Gmail accounts of several hundred people, including senior U.S. government officials, military personnel and political activists, Google Inc. said Wednesday.",http://www.huffingtonpost.com/huff-wires/20110601/us-tec-google-hacking-attack/,6/1/2011,Cross Site Request Forgery (CSRF),Insufficient Process Validation,Account Takeover,Hosting Providers,"Mountain View, CA",,,,,,,,,http://www.eweek.com/c/a/Security/Adobe-Patches-XSS-ZeroDay-Flaw-in-Flash-Used-in-Google-Gmail-Attack-166249/
-2011-142,WHID 2011-142: New Sony Hack Claims Over a Million User Passwords,"""SonyPictures.com was owned by a very simple SQL injection, one of the most primitive and common vulnerabilities, as we should all know by now. From a single injection, we accessed EVERYTHING. Why do you put such faith in a company that allows itself to become open to these simple attacks? What's worse is that every bit of data we took wasn't encrypted. Sony stored over 1,000,000 passwords of its customers in plaintext, which means it's just a matter of taking it. This is disgraceful and insecure: they were asking for it.""",http://techland.time.com/2011/06/02/new-sony-hack-claims-one-million-user-passwords/,6/2/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,"Tokyo, Japan",,,,,,,,,
-2011-142,WHID 2011-142: New Sony Hack Claims Over a Million User Passwords,"""SonyPictures.com was owned by a very simple SQL injection, one of the most primitive and common vulnerabilities, as we should all know by now. From a single injection, we accessed EVERYTHING. Why do you put such faith in a company that allows itself to become open to these simple attacks? What's worse is that every bit of data we took wasn't encrypted. Sony stored over 1,000,000 passwords of its customers in plaintext, which means it's just a matter of taking it. This is disgraceful and insecure: they were asking for it.""",http://techland.time.com/2011/06/02/new-sony-hack-claims-one-million-user-passwords/,6/2/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,"Tokyo, Japan",,,,,,,,,
-2011-143,"WHID 2011-143: Anonymous steals 10,000 Iranian government emails, plans DDoS attack","Anonymous has hacked into Iranian government servers and procured over 10,000 email messages from the Ministry of Foreign Affairs. The Ministry???s website is still down as of this writing, and the servers are under Anonymous control. One of the Iranian members of Anonymous involved with the operation sent me a message from the compromised email servers as evidence that they were still under Anonymous control.",http://thenextweb.com/industry/2011/06/03/anonymous-steals-10000-iranian-government-emails-plans-ddos-attack/,6/3/2011,Unknown,Unknown,Downtime,Government,Iran,,,,,,,,,
-2011-143,"WHID 2011-143: Anonymous steals 10,000 Iranian government emails, plans DDoS attack","Anonymous has hacked into Iranian government servers and procured over 10,000 email messages from the Ministry of Foreign Affairs. The Ministry???s website is still down as of this writing, and the servers are under Anonymous control. One of the Iranian members of Anonymous involved with the operation sent me a message from the compromised email servers as evidence that they were still under Anonymous control.",http://thenextweb.com/industry/2011/06/03/anonymous-steals-10000-iranian-government-emails-plans-ddos-attack/,6/3/2011,Unknown,Unknown,Downtime,Government,Iran,,,,,,,,,
-2011-144,WHID 2011-144: IC3 Cautions of Osama-Related XSS Assaults,"Reportedly, a related online scam has been detected as XSS (cross-site scripting). It (the scam) lets cyber-criminals to run a malware program on the attacked site via an end-user's Web-browser through values created within the attacked website's URL, forms of the web, alternatively during instances wherein websites invite visitors to post content straight away.",http://www.spamfighter.com/News-16247-IC3-Cautions-of-Osama-Related-XSS-Assaults.htm,6/6/2011,Cross Site Request Forgery (CSRF),Insufficient Process Validation,Link Spam,Web 2.0,"Apple Valley, CA",,,,,,,,,
-2011-144,WHID 2011-144: IC3 Cautions of Osama-Related XSS Assaults,"Reportedly, a related online scam has been detected as XSS (cross-site scripting). It (the scam) lets cyber-criminals to run a malware program on the attacked site via an end-user's Web-browser through values created within the attacked website's URL, forms of the web, alternatively during instances wherein websites invite visitors to post content straight away.",http://www.spamfighter.com/News-16247-IC3-Cautions-of-Osama-Related-XSS-Assaults.htm,6/6/2011,Cross Site Request Forgery (CSRF),Insufficient Process Validation,Link Spam,Web 2.0,"Apple Valley, CA",,,,,,,,,
-2011-145,WHID 2011-145: Sony Europe hacked by Lebanese hacker... Again,"By my count this is unlucky hack number 13 for Sony. A Lebanese hacker known as Idahc dumped another user database at Sony Europe containing approximately 120 usernames, passwords (plain text), mobile phone numbers, work emails and website addresses.",http://nakedsecurity.sophos.com/2011/06/04/sony-europe-hacked-by-lebanese-hacker-again/,6/4/2011,SQL Injection,Improper Output Handling,Leakage of Information,Entertainment,Belgium,,,,,,,,,
-2011-145,WHID 2011-145: Sony Europe hacked by Lebanese hacker... Again,"By my count this is unlucky hack number 13 for Sony. A Lebanese hacker known as Idahc dumped another user database at Sony Europe containing approximately 120 usernames, passwords (plain text), mobile phone numbers, work emails and website addresses.",http://nakedsecurity.sophos.com/2011/06/04/sony-europe-hacked-by-lebanese-hacker-again/,6/4/2011,SQL Injection,Improper Output Handling,Leakage of Information,Entertainment,Belgium,,,,,,,,,
-2011-146,WHID 2011-146: LulzSec has compromised SonyPictures.RU,"In addition to the attack detailed above, the hacking group known as LulzSec has compromised SonyPictures.RU through another SQL injection flaw. No personal information was disclosed in the attack; it appears to have been designed just to continue to point out security flaws in Sony's infrastructure to create PR problems for the media giant. In the note, LulzSec left a message: ""In Soviet Russia, SQL injects you...""",http://nakedsecurity.sophos.com/2011/06/04/sony-europe-hacked-by-lebanese-hacker-again/,6/5/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,Russian Federation,,,,,,,,,
-2011-146,WHID 2011-146: LulzSec has compromised SonyPictures.RU,"In addition to the attack detailed above, the hacking group known as LulzSec has compromised SonyPictures.RU through another SQL injection flaw. No personal information was disclosed in the attack; it appears to have been designed just to continue to point out security flaws in Sony's infrastructure to create PR problems for the media giant. In the note, LulzSec left a message: ""In Soviet Russia, SQL injects you...""",http://nakedsecurity.sophos.com/2011/06/04/sony-europe-hacked-by-lebanese-hacker-again/,6/5/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,Russian Federation,,,,,,,,,
-2011-147,"WHID 2011-147: Now Nintendo Admits It Was Hacked, Says No Customer Data Stolen","Nintendo acknowledged a security breach in a statement yesterday, explaining that its U.S. servers came under cyber-fire a few weeks ago, but stressed that no personal user data was in breach.",http://techland.time.com/2011/06/06/now-nintendo-admits-it-was-hacked-says-no-customer-data-stolen/#ixzz1OWrKxZOC,6/6/2011,Unknown,Unknown,Leakage of Information,Entertainment,"Redmond, WA",,,,,,,,,http://pastebin.com/QFJN82X4
-2011-147,"WHID 2011-147: Now Nintendo Admits It Was Hacked, Says No Customer Data Stolen","Nintendo acknowledged a security breach in a statement yesterday, explaining that its U.S. servers came under cyber-fire a few weeks ago, but stressed that no personal user data was in breach.",http://techland.time.com/2011/06/06/now-nintendo-admits-it-was-hacked-says-no-customer-data-stolen/#ixzz1OWrKxZOC,6/6/2011,Unknown,Unknown,Leakage of Information,Entertainment,"Redmond, WA",,,,,,,,,http://pastebin.com/QFJN82X4
-2011-148,"WHID 2011-148: India???s fight against corruption mounts, govt website hacked","Well, well, well, what do we have here? The fight against corruption in India spawned a twitter app to spread the word the other day. The Twitterverse went on a mission of findingmanmohan yesterday, and today, an anonymous group has hacked a particular government website with a message to Mr. Prime Minister and others (Kapil Sibal probably).",http://asiancorrespondent.com/56835/hacked-india%E2%80%99s-fight-against-corruption-goes-berserk-govt-website-hacked/,6/7/2011,Unknown,Improper Output Handling,Defacement,Government,"New Delhi, India",,,,,,,,,
-2011-148,"WHID 2011-148: India???s fight against corruption mounts, govt website hacked","Well, well, well, what do we have here? The fight against corruption in India spawned a twitter app to spread the word the other day. The Twitterverse went on a mission of findingmanmohan yesterday, and today, an anonymous group has hacked a particular government website with a message to Mr. Prime Minister and others (Kapil Sibal probably).",http://asiancorrespondent.com/56835/hacked-india%E2%80%99s-fight-against-corruption-goes-berserk-govt-website-hacked/,6/7/2011,Unknown,Improper Output Handling,Defacement,Government,"New Delhi, India",,,,,,,,,
-2011-149,"WHID 2011-149: Sony Investigating Two Possible Hacker Attacks, Suspends Brazil Music Site","The company suspended its Brazilian music entertainment website while it looks into a possible breach, it said today. Sony also is investigating a hacker group???s claim that it stole data related to the company???s game operation.",http://www.bloomberg.com/news/2011-06-07/sony-says-brazil-music-website-suspended-after-suspected-attack-by-hackers.html,6/7/2011,Unknown,Unknown,Downtime,Entertainment,Brazil,,,,,,,,,
-2011-149,"WHID 2011-149: Sony Investigating Two Possible Hacker Attacks, Suspends Brazil Music Site","The company suspended its Brazilian music entertainment website while it looks into a possible breach, it said today. Sony also is investigating a hacker group???s claim that it stole data related to the company???s game operation.",http://www.bloomberg.com/news/2011-06-07/sony-says-brazil-music-website-suspended-after-suspected-attack-by-hackers.html,6/7/2011,Unknown,Unknown,Downtime,Entertainment,Brazil,,,,,,,,,
-2011-14,WHID 2011-14: Hacker Hits FOX23 School Closings,"FOX23 distributes top secret information to school districts so they can post school closings to our website. Tuesday morning, that information fell into the wrong hands, and for five minutes students in Broken Arrow thought they had a day off school.
-2011-150,"WHID 2011-150: Yahoo!, Hotmail accounts targeted by hackers","Trend???s researchers in Taiwan also identified attacks that exploit a vulnerability in the Microsoft Hotmail web email service. ???Rather than clicking a malicious link, even the simple act of previewing the malicious email message can compromise a user???s account???, noted Villeneuve. ???This phishing email pretended to be from the Facebook security team.???",http://www.infosecurity-us.com/view/18446/yahoo-hotmail-accounts-targeted-by-hackers/,6/6/2011,Cross Site Scripting (XSS),Improper Output Handling,Session Hijacking,Hosting Providers,"Redmond, WA",,,,,,,,,
-2011-150,"WHID 2011-150: Yahoo!, Hotmail accounts targeted by hackers","Trend???s researchers in Taiwan also identified attacks that exploit a vulnerability in the Microsoft Hotmail web email service. ???Rather than clicking a malicious link, even the simple act of previewing the malicious email message can compromise a user???s account???, noted Villeneuve. ???This phishing email pretended to be from the Facebook security team.???",http://www.infosecurity-us.com/view/18446/yahoo-hotmail-accounts-targeted-by-hackers/,6/6/2011,Cross Site Scripting (XSS),Improper Output Handling,Session Hijacking,Hosting Providers,"Redmond, WA",,,,,,,,,
-2011-151,WHID 2011-151: Hacker Arrested for Stealing Nude Photos,"According to police, Joseph B. Campbell used phishing to trick his victims -- some of whom he knew from high-school -- into divulging their passwords. He'd get email addresses from their Facebook pages, and then send his victims phoney electronic greeting cards that would ask them for login information for Web mail accounts, said Thomas Edwards, chief of police with the Belleair Police Department.",http://www.computerworld.com/s/article/9217319/Police_Man_stole_nude_photos_from_hacked_e_mail_accounts,6/6/2011,Phishing,Insufficient Authentication,Leakage of Information,Hosting Providers,,,,,,,,,,
-2011-151,WHID 2011-151: Hacker Arrested for Stealing Nude Photos,"According to police, Joseph B. Campbell used phishing to trick his victims -- some of whom he knew from high-school -- into divulging their passwords. He'd get email addresses from their Facebook pages, and then send his victims phoney electronic greeting cards that would ask them for login information for Web mail accounts, said Thomas Edwards, chief of police with the Belleair Police Department.",http://www.computerworld.com/s/article/9217319/Police_Man_stole_nude_photos_from_hacked_e_mail_accounts,6/6/2011,Phishing,Insufficient Authentication,Leakage of Information,Hosting Providers,,,,,,,,,,
-2011-152,WHID 2011-152: DDoS attack takes down Atlassian's SaaS platform,"A distributed denial-of-service (DDoS) attack against Atlassian's hosting provider took the company's Software-as-a-Service (SaaS) platform down for a few hours this morning, with services returning this afternoon.",http://www.zdnet.com.au/atlassian-downed-by-ddos-attack-339316263.htm,6/6/2011,Denial of Service,Insufficient Anti-automation,Downtime,Technology,"Saint Louis, MO",,,,,,,,,
-2011-152,WHID 2011-152: DDoS attack takes down Atlassian's SaaS platform,"A distributed denial-of-service (DDoS) attack against Atlassian's hosting provider took the company's Software-as-a-Service (SaaS) platform down for a few hours this morning, with services returning this afternoon.",http://www.zdnet.com.au/atlassian-downed-by-ddos-attack-339316263.htm,6/6/2011,Denial of Service,Insufficient Anti-automation,Downtime,Technology,"Saint Louis, MO",,,,,,,,,
-2011-153,WHID 2011-153: FBI Partner Organization Website Hacked,"nfraGard Atlanta Members Alliance said Sunday that about 180 passwords belonging to members of the FBI partner organization have been stolen and leaked to the Internet. Paul Farley, president of the organization, told The Associated Press (AP) that the logins belonged to members of the local chapter of InfraGard, a public-private partnership devoted to sharing information about threats to U.S. physical and Internet infrastructure. ""Someone did compromise the website,"" Farley told AP. ""We do not at this time know how the attack occurred or the method used to reveal the passwords.""",http://www.redorbit.com/news/technology/2059174/fbi_partner_organization_website_hacked/,6/6/2011,SQL Injection,Improper Input Handling,Leakage of Information,Government,"Atlanta, GA",,,,,,,,,
-2011-153,WHID 2011-153: FBI Partner Organization Website Hacked,"nfraGard Atlanta Members Alliance said Sunday that about 180 passwords belonging to members of the FBI partner organization have been stolen and leaked to the Internet. Paul Farley, president of the organization, told The Associated Press (AP) that the logins belonged to members of the local chapter of InfraGard, a public-private partnership devoted to sharing information about threats to U.S. physical and Internet infrastructure. ""Someone did compromise the website,"" Farley told AP. ""We do not at this time know how the attack occurred or the method used to reveal the passwords.""",http://www.redorbit.com/news/technology/2059174/fbi_partner_organization_website_hacked/,6/6/2011,SQL Injection,Improper Input Handling,Leakage of Information,Government,"Atlanta, GA",,,,,,,,,
-2011-154,2011-154: Hundreds of websites in Vietnam hacked,"VietNamNet Bridge ??? Just within several days of early June, technology and security forums have reckoned hundreds of ???.vn??? websites which have been hacked, including the websites of government agencies and ministries.",http://english.vietnamnet.vn/en/science-technology/9213/hundreds-of-websites-in-vietnam-hacked.html,6/6/2011,Unknown,Improper Output Handling,Defacement,Government,"Hanoi, VN",,,,,,,,,
-2011-154,2011-154: Hundreds of websites in Vietnam hacked,"VietNamNet Bridge ??? Just within several days of early June, technology and security forums have reckoned hundreds of ???.vn??? websites which have been hacked, including the websites of government agencies and ministries.",http://english.vietnamnet.vn/en/science-technology/9213/hundreds-of-websites-in-vietnam-hacked.html,6/6/2011,Unknown,Improper Output Handling,Defacement,Government,"Hanoi, VN",,,,,,,,,
-2011-155,WHID 2011-155: Hacker breaks into MIT website,"Despite its vaunted technological knowhow, even the Massachussetts Institute of Technology (MIT) was not spared from hackers who broke into its website and posted the stolen data online. The hacker named Cyber_Owner broke into MIT's International Liaison Program site (ilp.mit.edu), The Hacker News reported Wednesday.",http://www.gmanews.tv/story/222877/technology/hacker-breaks-into-mit-website,6/8/2011,SQL Injection,Improper Input Handling,Leakage of Information,Education,"Cambridge, MA",,,,,,,,,
-2011-155,WHID 2011-155: Hacker breaks into MIT website,"Despite its vaunted technological knowhow, even the Massachussetts Institute of Technology (MIT) was not spared from hackers who broke into its website and posted the stolen data online. The hacker named Cyber_Owner broke into MIT's International Liaison Program site (ilp.mit.edu), The Hacker News reported Wednesday.",http://www.gmanews.tv/story/222877/technology/hacker-breaks-into-mit-website,6/8/2011,SQL Injection,Improper Input Handling,Leakage of Information,Education,"Cambridge, MA",,,,,,,,,
-2011-156,WHID 2011-156: Conservative Party website hacked,A local MP's Twitter account fell victim to part of a hoax about Prime Minister Stephen Harper Tuesday. False information on the hacked Conservative Party website said the prime minister was rushed to Toronto General Hospital by helicopter after his wife called 911.,http://www.newsdurhamregion.com/news/article/178825,6/7/2011,Unknown,Unknown,Disinformation,Government,"Ottawa, CA",,,,,,,,,
-2011-156,WHID 2011-156: Conservative Party website hacked,A local MP's Twitter account fell victim to part of a hoax about Prime Minister Stephen Harper Tuesday. False information on the hacked Conservative Party website said the prime minister was rushed to Toronto General Hospital by helicopter after his wife called 911.,http://www.newsdurhamregion.com/news/article/178825,6/7/2011,Unknown,Unknown,Disinformation,Government,"Ottawa, CA",,,,,,,,,
-2011-157,WHID 2011-157: MI6 replace al-Qaeda bomb-making instructions with cupcake recipes,"The British goverment???s Secrect Intelligence Service department called MI6 has carried out a rather amusing, but also very important website hack. The terrorist organization al-Qaeda has a number of ways to get new recruits, or teach existing members how to make bombs, and generally cause upset and violence in whatever area of the world they operate. One such information point is a new English-language online magazine that had information on how to make bombs using common househols items in your kitchen.",http://www.geek.com/articles/geek-cetera/mi6-replace-al-qaeda-bomb-making-instructions-with-cupcake-recipes-2011066/,6/6/2011,Unknown,Unknown,Disinformation,Information Services,Yemen,,,,,,,,,
-2011-157,WHID 2011-157: MI6 replace al-Qaeda bomb-making instructions with cupcake recipes,"The British goverment???s Secrect Intelligence Service department called MI6 has carried out a rather amusing, but also very important website hack. The terrorist organization al-Qaeda has a number of ways to get new recruits, or teach existing members how to make bombs, and generally cause upset and violence in whatever area of the world they operate. One such information point is a new English-language online magazine that had information on how to make bombs using common househols items in your kitchen.",http://www.geek.com/articles/geek-cetera/mi6-replace-al-qaeda-bomb-making-instructions-with-cupcake-recipes-2011066/,6/6/2011,Unknown,Unknown,Disinformation,Information Services,Yemen,,,,,,,,,
-2011-158,WHID 2011-158: Citigroup Card Customers??? Data Hacked,Citigroup acknowledged on Thursday that unidentified hackers had breached its security and gained access to the data of hundreds of thousands of its bank card customers.,http://dealbook.nytimes.com/2011/06/09/citigroup-card-customers-data-hacked/,6/9/2011,Predictable Resource Location,Insufficient Authorization,Leakage of Information,Finance,"New York, NY",,,,,,,,,
-2011-158,WHID 2011-158: Citigroup Card Customers??? Data Hacked,Citigroup acknowledged on Thursday that unidentified hackers had breached its security and gained access to the data of hundreds of thousands of its bank card customers.,http://dealbook.nytimes.com/2011/06/09/citigroup-card-customers-data-hacked/,6/9/2011,Predictable Resource Location,Insufficient Authorization,Leakage of Information,Finance,"New York, NY",,,,,,,,,
-2011-159,WHID 2011-159: Sony Portugal latest to fall to hackers,"The same Lebanese hacker who targeted Sony Europe on Friday has now dumped a database from Sony Portugal. The hacker claims to be a grey hat, not a black hat, according to his post to pastebin.com. ""I am not a black hat to dump all the database I am Grey hat"" Instead of dumping the entire database like many previous Sony attackers, idahc only dumped the email addresses from one table in Sony's database. He claims to have discovered three different flaws on SonyMusic.pt, including SQL injection, XSS (cross-site scripting) and iFrame injection.",http://nakedsecurity.sophos.com/2011/06/09/sony-portugal-latest-to-fall-to-hackers/,6/9/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,"Muenchen, DE",,,,,,,,,
-2011-159,WHID 2011-159: Sony Portugal latest to fall to hackers,"The same Lebanese hacker who targeted Sony Europe on Friday has now dumped a database from Sony Portugal. The hacker claims to be a grey hat, not a black hat, according to his post to pastebin.com. ""I am not a black hat to dump all the database I am Grey hat"" Instead of dumping the entire database like many previous Sony attackers, idahc only dumped the email addresses from one table in Sony's database. He claims to have discovered three different flaws on SonyMusic.pt, including SQL injection, XSS (cross-site scripting) and iFrame injection.",http://nakedsecurity.sophos.com/2011/06/09/sony-portugal-latest-to-fall-to-hackers/,6/9/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,"Muenchen, DE",,,,,,,,,
-2011-15,WHID 2011-15: Hacker Code Lingered on Home Depot Website,"An IT analyst has uncovered the lingering remnants of a 2009 breach of security on the website of the major retailer: secret code hidden on the website that redirected the user's browser to a site that served up malware.
-2011-160,WHID 2011-160: Hackers Hit UK Game Publisher Codemasters,"Another day, another hack. This time, the Web site for UK game developer Codemasters has been compromised. In a Thursday note posted on the company's forums, Codemasters said that hackers gained unauthorized entry to Codemasters.com on Friday, June 3. ""As soon as the intrusion was detected, we immediately took codemasters.com and associated web services offline in order to prevent any further intrusion,"" a spokeswoman said.","http://www.pcmag.com/article2/0,2817,2386727,00.asp",6/3/2011,Unknown,Unknown,Leakage of Information,Entertainment,United Kingdom,,,,,,,,,
-2011-160,WHID 2011-160: Hackers Hit UK Game Publisher Codemasters,"Another day, another hack. This time, the Web site for UK game developer Codemasters has been compromised. In a Thursday note posted on the company's forums, Codemasters said that hackers gained unauthorized entry to Codemasters.com on Friday, June 3. ""As soon as the intrusion was detected, we immediately took codemasters.com and associated web services offline in order to prevent any further intrusion,"" a spokeswoman said.","http://www.pcmag.com/article2/0,2817,2386727,00.asp",6/3/2011,Unknown,Unknown,Leakage of Information,Entertainment,United Kingdom,,,,,,,,,
-2011-161,WHID 2011-161: Price watch portal hacked,Lowyat.net founder and chief executive officer Vijandren Ramadass said an SQL injection (a code injection technique that exploits a security vulnerability in the database) could be used on the price watch portal to retrieve the entire database remotely.,http://thestar.com.my/news/story.asp?file=/2011/6/11/nation/8883275&sec=nation,6/11/2011,SQL Injection,Improper Input Handling,Leakage of Information,Retail,"Ipoh, MY",,,,,,,,,
-2011-161,WHID 2011-161: Price watch portal hacked,Lowyat.net founder and chief executive officer Vijandren Ramadass said an SQL injection (a code injection technique that exploits a security vulnerability in the database) could be used on the price watch portal to retrieve the entire database remotely.,http://thestar.com.my/news/story.asp?file=/2011/6/11/nation/8883275&sec=nation,6/11/2011,SQL Injection,Improper Input Handling,Leakage of Information,Retail,"Ipoh, MY",,,,,,,,,
-2011-162,WHID 2011-162: Games co Epic resets passwords after hack attack,"Games developer Epic Games has reset user passwords following the discovery of a hack attack against its websites. Criminal miscreants made off with email addresses and encrypted passwords of forum users after breaking into Epic's forum site. Epic's main web site was also hit, according to an email sent by the firm over the weekend and forwarded by readers to El Reg.",http://www.theregister.co.uk/2011/06/13/games_firm_epic_breach/,6/13/2011,Unknown,Unknown,Leakage of Information,Entertainment,"Cary, NC",,,,,,,,,
-2011-162,WHID 2011-162: Games co Epic resets passwords after hack attack,"Games developer Epic Games has reset user passwords following the discovery of a hack attack against its websites. Criminal miscreants made off with email addresses and encrypted passwords of forum users after breaking into Epic's forum site. Epic's main web site was also hit, according to an email sent by the firm over the weekend and forwarded by readers to El Reg.",http://www.theregister.co.uk/2011/06/13/games_firm_epic_breach/,6/13/2011,Unknown,Unknown,Leakage of Information,Entertainment,"Cary, NC",,,,,,,,,
-2011-163,WHID 2011-163: LulzSec Targets Gaming Websites in its Titanic Takeover Tuesday,"The number of websites targeted by LulzSec is steadily increasing. After targeting Bethesda, Sony and a whole lot of websites, they have now launched a series of distributed denial of service (DDoS) attacks on Escapist magazine, as well as other gaming websites. They have termed the day ??? Titanic Takeover Tuesday.",http://tech2.in.com/news/general/lulzsec-targets-gaming-websites-in-its-titanic-takeover-tuesday/225312,6/15/2011,Denial of Service,Insufficient Anti-automation,Downtime,Entertainment,,Yes,Titanic Takeover Tuesday,,,,,,,
-2011-163,WHID 2011-163: LulzSec Targets Gaming Websites in its Titanic Takeover Tuesday,"The number of websites targeted by LulzSec is steadily increasing. After targeting Bethesda, Sony and a whole lot of websites, they have now launched a series of distributed denial of service (DDoS) attacks on Escapist magazine, as well as other gaming websites. They have termed the day ??? Titanic Takeover Tuesday.",http://tech2.in.com/news/general/lulzsec-targets-gaming-websites-in-its-titanic-takeover-tuesday/225312,6/15/2011,Denial of Service,Insufficient Anti-automation,Downtime,Entertainment,,Yes,Titanic Takeover Tuesday,,,,,,,
-2011-164,WHID 2011-164: Hackers strike Malaysian websites for a 2nd day,"Hackers struck Malaysian websites for a second day on Friday, an Internet regulator said, as the country scrambled to bring its government portal back online after the latest outbreak in a cyberwar waged by online activists.",http://www.reuters.com/article/2011/06/17/malaysia-hackers-idUSL3E7HH1D220110617,6/17/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,Malaysia,,,,,,,,,
-2011-164,WHID 2011-164: Hackers strike Malaysian websites for a 2nd day,"Hackers struck Malaysian websites for a second day on Friday, an Internet regulator said, as the country scrambled to bring its government portal back online after the latest outbreak in a cyberwar waged by online activists.",http://www.reuters.com/article/2011/06/17/malaysia-hackers-idUSL3E7HH1D220110617,6/17/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,Malaysia,,,,,,,,,
-2011-165,WHID 2011-165: Alberta gaming company hit by hackers,"A local gaming company is the latest to fall victim to online hackers. In a statement posted on its website Tuesday, BioWare said a hacker gained unauthorized access to the decade-old BioWare community server system associated with the Neverwinter Nights forums.",http://www.torontosun.com/2011/06/17/alberta-gaming-company-hit-by-hackers,6/17/2011,Unknown,Unknown,Leakage of Information,Entertainment,"Alberta, CA",,,,,,,,,
-2011-165,WHID 2011-165: Alberta gaming company hit by hackers,"A local gaming company is the latest to fall victim to online hackers. In a statement posted on its website Tuesday, BioWare said a hacker gained unauthorized access to the decade-old BioWare community server system associated with the Neverwinter Nights forums.",http://www.torontosun.com/2011/06/17/alberta-gaming-company-hit-by-hackers,6/17/2011,Unknown,Unknown,Leakage of Information,Entertainment,"Alberta, CA",,,,,,,,,
-2011-166,WHID 2011-166: Lulzsec gets hacking downunder,"Notorious hackivist group Lulzsec has brought down Australian domain registrar and web hosts Distribute.IT and publicly published a list of 62,000 international email addresses and passwords.",http://www.theregister.co.uk/2011/06/17/lulzsec_release_aus_data/,6/11/2011,Unknown,Unknown,Leakage of Information,Hosting Providers,Australia,,,,,,,,,
-2011-166,WHID 2011-166: Lulzsec gets hacking downunder,"Notorious hackivist group Lulzsec has brought down Australian domain registrar and web hosts Distribute.IT and publicly published a list of 62,000 international email addresses and passwords.",http://www.theregister.co.uk/2011/06/17/lulzsec_release_aus_data/,6/11/2011,Unknown,Unknown,Leakage of Information,Hosting Providers,Australia,,,,,,,,,
-2011-167,WHID 2011-167: Report: U.S. Senate site hacked again,"The U.S. Senate site was hacked again yesterday, Reuters reports. According to the news service, hackers breached the site and stole information, though the type of data taken was not divulged. Martina Bradford, the U.S. Senate's deputy sergeant at arms, confirmed the breach to Reuters yesterday. However, she said, the hackers are ""getting nothing"" of value and the Senate so far has ""been able to stay ahead of the hackers and keep them out of the main separate network."" Read more: http://news.cnet.com/8301-13506_3-20071538-17/report-u.s-senate-site-hacked-again/#ixzz1PY70GqZ8",http://news.cnet.com/8301-13506_3-20071538-17/report-u.s-senate-site-hacked-again/,6/16/2011,Unknown,Unknown,Leakage of Information,Government,"Washington, DC",,,,,,,,,
-2011-167,WHID 2011-167: Report: U.S. Senate site hacked again,"The U.S. Senate site was hacked again yesterday, Reuters reports. According to the news service, hackers breached the site and stole information, though the type of data taken was not divulged. Martina Bradford, the U.S. Senate's deputy sergeant at arms, confirmed the breach to Reuters yesterday. However, she said, the hackers are ""getting nothing"" of value and the Senate so far has ""been able to stay ahead of the hackers and keep them out of the main separate network."" Read more: http://news.cnet.com/8301-13506_3-20071538-17/report-u.s-senate-site-hacked-again/#ixzz1PY70GqZ8",http://news.cnet.com/8301-13506_3-20071538-17/report-u.s-senate-site-hacked-again/,6/16/2011,Unknown,Unknown,Leakage of Information,Government,"Washington, DC",,,,,,,,,
-2011-168,WHID 2011-168: Hacker Group Lulz Security attacks CIA's website,"Lulz Security continues grabbing the lime light with its hacking activities and this time its latest target is the public website of the U.S. Central Intelligence Agency (CIA). There recent attack brought the CIA website down for couple of hours and remained inaccessible for all that time, however,the hack claim could not immediately be verified. It was not clear if the distortion was due to LulzSec's efforts or due to the large number of internet users trying to check the site. The group claimed the attack to be carried out by them on its Twitter feed where they displayed a message saying ""Tango down - cia.gov - for the lulz,""",http://www.siliconindia.com/shownews/Hacker-Group-Lulz-Security-attacks-CIAs-website-nid-84765.html?utm_source=clicktrack&utm_medium=banner&utm_campaign=DontMiss,6/16/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Vienna, VA",,,,,,,,,
-2011-168,WHID 2011-168: Hacker Group Lulz Security attacks CIA's website,"Lulz Security continues grabbing the lime light with its hacking activities and this time its latest target is the public website of the U.S. Central Intelligence Agency (CIA). There recent attack brought the CIA website down for couple of hours and remained inaccessible for all that time, however,the hack claim could not immediately be verified. It was not clear if the distortion was due to LulzSec's efforts or due to the large number of internet users trying to check the site. The group claimed the attack to be carried out by them on its Twitter feed where they displayed a message saying ""Tango down - cia.gov - for the lulz,""",http://www.siliconindia.com/shownews/Hacker-Group-Lulz-Security-attacks-CIAs-website-nid-84765.html?utm_source=clicktrack&utm_medium=banner&utm_campaign=DontMiss,6/16/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Vienna, VA",,,,,,,,,
-2011-169,"WHID 2011-169: Sega Pass Database Hacked, Account Information Compromised","Over the past few months, a slew of hacks, DDoS attacks and data breaches have rocked the gaming world. After the infamous hack of the PlayStation Network, many thought that it would be the end of the attacks, but publishers like Nintendo, Bethesda, Codemasters and Epic have all suffered from various breaches in security. The hackers have struck again, this time infiltrating Sega???s database. Only moments ago, Sega sent out an email to their Sega Pass users informing them of the hack",http://playstationlifestyle.net/2011/06/17/sega-pass-database-hacked/,6/17/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,United Kingdom,,,,,,,,,
-2011-169,"WHID 2011-169: Sega Pass Database Hacked, Account Information Compromised","Over the past few months, a slew of hacks, DDoS attacks and data breaches have rocked the gaming world. After the infamous hack of the PlayStation Network, many thought that it would be the end of the attacks, but publishers like Nintendo, Bethesda, Codemasters and Epic have all suffered from various breaches in security. The hackers have struck again, this time infiltrating Sega???s database. Only moments ago, Sega sent out an email to their Sega Pass users informing them of the hack",http://playstationlifestyle.net/2011/06/17/sega-pass-database-hacked/,6/17/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,United Kingdom,,,,,,,,,
-2011-16,WHID 2011-16: North Korea: South Korea Cyber Attack Accusation After Website Hacked,"Political Hacktivism. North Korea is accusing South Korean Internet users of hacking into one of its websites, calling the behavior a provocation aimed at undermining its national dignity. The North's government-run Uriminzokkiri website said Tuesday that South Korean Internet users recently deleted articles on the site and posted messages slandering the North's dignity.",http://www.huffingtonpost.com/2011/01/11/north-korea-accuses-south_1_n_807436.html,1/11/2011,Unknown,Unknown,Defacement,Government,North Korea,No,,,South Korea,,,,,
-2011-16,WHID 2011-16: North Korea: South Korea Cyber Attack Accusation After Website Hacked,"Political Hacktivism. North Korea is accusing South Korean Internet users of hacking into one of its websites, calling the behavior a provocation aimed at undermining its national dignity. The North's government-run Uriminzokkiri website said Tuesday that South Korean Internet users recently deleted articles on the site and posted messages slandering the North's dignity.",http://www.huffingtonpost.com/2011/01/11/north-korea-accuses-south_1_n_807436.html,1/11/2011,Unknown,Unknown,Defacement,Government,North Korea,No,,,South Korea,,,,,
-2011-170,WHID 2011-170: Internet hackers take down major online spa management system,"Over the last two days MindBodyOnline.com has joined the ranks of those attacked by Internet hackers. Using a Denial of Service Attack hackers have successfully shutdown the online software program which provide services to thousands of day spas, massage facilities, yoga and pilates studios and similar clients in over 50 countries.",http://www.examiner.com/massage-therapy-in-national/internet-hackers-take-down-major-online-spa-management-system,6/17/2011,Denial of Service,Insufficient Anti-automation,Downtime,Retail,"Sunnyvale, CA",,,,,,,,,
-2011-170,WHID 2011-170: Internet hackers take down major online spa management system,"Over the last two days MindBodyOnline.com has joined the ranks of those attacked by Internet hackers. Using a Denial of Service Attack hackers have successfully shutdown the online software program which provide services to thousands of day spas, massage facilities, yoga and pilates studios and similar clients in over 50 countries.",http://www.examiner.com/massage-therapy-in-national/internet-hackers-take-down-major-online-spa-management-system,6/17/2011,Denial of Service,Insufficient Anti-automation,Downtime,Retail,"Sunnyvale, CA",,,,,,,,,
-2011-171,WHID 2011-171: CIA website taken down by DDoS attack,"The hacking group LulzSec has hit the US government for the second time in a week, taking down the website of the CIA. A spokesperson told Reuters that its website was taken down, but that the group were prevented from accessing any sensitive data. According to the news agency, this attack was similar to the attack on the Senate in that hackers broke into the public site and downloaded information.",http://www.scmagazineuk.com/cia-website-taken-down-by-ddos-attack/article/205403/,6/16/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Vienna, VA",,,,,,,,,
-2011-171,WHID 2011-171: CIA website taken down by DDoS attack,"The hacking group LulzSec has hit the US government for the second time in a week, taking down the website of the CIA. A spokesperson told Reuters that its website was taken down, but that the group were prevented from accessing any sensitive data. According to the news agency, this attack was similar to the attack on the Senate in that hackers broke into the public site and downloaded information.",http://www.scmagazineuk.com/cia-website-taken-down-by-ddos-attack/article/205403/,6/16/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Vienna, VA",,,,,,,,,
-2011-172,WHID 2011-172: Sony Pictures French Website Hacked... Again!,"According to a plain text post on Pastebin, Idahc claims that they found a SQL injection on sonypictures.fr but they will not publish the entire database and that they didn't upload a shell. They said that this was a POC while claiming not to be black hats. They said data retrieved from the site includes personal user information and there are a total of 177172 email addresses.",http://tech2.in.com/news/general/sony-pictures-french-website-hacked-again/226062,6/20/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,France,,,,,,,,,
-2011-172,WHID 2011-172: Sony Pictures French Website Hacked... Again!,"According to a plain text post on Pastebin, Idahc claims that they found a SQL injection on sonypictures.fr but they will not publish the entire database and that they didn't upload a shell. They said that this was a POC while claiming not to be black hats. They said data retrieved from the site includes personal user information and there are a total of 177172 email addresses.",http://tech2.in.com/news/general/sony-pictures-french-website-hacked-again/226062,6/20/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,France,,,,,,,,,
-2011-173,WHID 2011-173: LulzSec takes out Serious Organised Crime Agency,Mischief makers LulzSec say they have downed the website of the UK's Serious Organised Crime Agency (Soca). The site www.soca.gov.uk disappeared completely from the web this afternoon and is now timing out regularly although is occasionally accessible. The site appears to be the victim of a DDoS attack. Read more: http://www.thinq.co.uk/2011/6/20/lulzsec-takes-out-serious-organised-crime-agency/#ixzz1Q7c7o8M0,http://www.thinq.co.uk/2011/6/20/lulzsec-takes-out-serious-organised-crime-agency/,6/20/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,United Kingdom,,,,,,,,,
-2011-173,WHID 2011-173: LulzSec takes out Serious Organised Crime Agency,Mischief makers LulzSec say they have downed the website of the UK's Serious Organised Crime Agency (Soca). The site www.soca.gov.uk disappeared completely from the web this afternoon and is now timing out regularly although is occasionally accessible. The site appears to be the victim of a DDoS attack. Read more: http://www.thinq.co.uk/2011/6/20/lulzsec-takes-out-serious-organised-crime-agency/#ixzz1Q7c7o8M0,http://www.thinq.co.uk/2011/6/20/lulzsec-takes-out-serious-organised-crime-agency/,6/20/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,United Kingdom,,,,,,,,,
-2011-174,WHID 2011-174: Network Solutions suffers two DDoS attacks,"Two attacks on consecutive days left Web host and domain name registry Network Solutions' customers unable to access their Web sites and servers. A distributed denial-of-service (DDoS) attack was carried out against Network Solutions on yesterday afternoon, and again this morning, according to a post on the company's official blog by spokesman Shashi Bellamkonda. Read more: http://news.cnet.com/8301-31021_3-20073054-260/network-solutions-suffers-two-ddos-attacks/#ixzz1Q7eXdQJd",http://news.cnet.com/8301-31021_3-20073054-260/network-solutions-suffers-two-ddos-attacks/,6/21/2011,Denial of Service,Insufficient Anti-automation,Downtime,Service Providers,"Herndon, VA",,,,,,,,,
-2011-174,WHID 2011-174: Network Solutions suffers two DDoS attacks,"Two attacks on consecutive days left Web host and domain name registry Network Solutions' customers unable to access their Web sites and servers. A distributed denial-of-service (DDoS) attack was carried out against Network Solutions on yesterday afternoon, and again this morning, according to a post on the company's official blog by spokesman Shashi Bellamkonda. Read more: http://news.cnet.com/8301-31021_3-20073054-260/network-solutions-suffers-two-ddos-attacks/#ixzz1Q7eXdQJd",http://news.cnet.com/8301-31021_3-20073054-260/network-solutions-suffers-two-ddos-attacks/,6/21/2011,Denial of Service,Insufficient Anti-automation,Downtime,Service Providers,"Herndon, VA",,,,,,,,,
-2011-175,WHID 2011-175: LulzSec rogue suspected of Bitcoin hack,"Due to the recent events at MtGox.com, we at Britcoin have decided to move our servers to a new location,"" read a Britcoin statement. ""MtGox suffered an SQL injection [a form of hacking attack that creates direct access to databases and files] which means access to the site's funds were in the hands of the malicious hacker.",http://www.guardian.co.uk/technology/2011/jun/22/lulzsec-rogue-suspected-of-bitcoin-hack,6/22/2011,SQL Injection,Improper Input Handling,Monetary Loss,Finance,"Mountain View, CA",,,,,,,,,
-2011-175,WHID 2011-175: LulzSec rogue suspected of Bitcoin hack,"Due to the recent events at MtGox.com, we at Britcoin have decided to move our servers to a new location,"" read a Britcoin statement. ""MtGox suffered an SQL injection [a form of hacking attack that creates direct access to databases and files] which means access to the site's funds were in the hands of the malicious hacker.",http://www.guardian.co.uk/technology/2011/jun/22/lulzsec-rogue-suspected-of-bitcoin-hack,6/22/2011,SQL Injection,Improper Input Handling,Monetary Loss,Finance,"Mountain View, CA",,,,,,,,,
-2011-176,WHID 2011-176: Brazil government latest victim of hacker attack,Hackers briefly disabled three websites belonging to the Brazilian government early on Wednesday in the latest of an international wave of cyber attacks on companies and organizations.,http://www.reuters.com/article/2011/06/22/us-cybersecurity-brazil-hackers-idUSTRE75L31K20110622,6/22/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,Brazil,,,,,,,,,
-2011-176,WHID 2011-176: Brazil government latest victim of hacker attack,Hackers briefly disabled three websites belonging to the Brazilian government early on Wednesday in the latest of an international wave of cyber attacks on companies and organizations.,http://www.reuters.com/article/2011/06/22/us-cybersecurity-brazil-hackers-idUSTRE75L31K20110622,6/22/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,Brazil,,,,,,,,,
-2011-177,WHID 2011-177: NATO website 'hacked',"NATO said that one of its websites was the subject of a probable data breach, but it did not contain any classified data.",http://timesofindia.indiatimes.com/tech/news/internet/NATO-website-hacked/articleshow/8973297.cms,6/24/2011,Unknown,Unknown,Leakage of Information,Government,"Brussels, BE",,,,,,,,,
-2011-177,WHID 2011-177: NATO website 'hacked',"NATO said that one of its websites was the subject of a probable data breach, but it did not contain any classified data.",http://timesofindia.indiatimes.com/tech/news/internet/NATO-website-hacked/articleshow/8973297.cms,6/24/2011,Unknown,Unknown,Leakage of Information,Government,"Brussels, BE",,,,,,,,,
-2011-178,WHID 2011-178: Part II: PBS Hacked Again. Entire Database Exposed With Simple SQL Injection,"After being hacked by LulzSec several weeks ago, PBS appears to have learned nothing. A new hack by ???Warv0x??? (AKA Kaihoe) uses the same basic SQL injection technique LulzSec has been using on their many victims, and once again has exposed PBS.org???s entire database.",http://gadgetsteria.com/2011/06/24/part-ii-pbs-hacked-again-entire-database-exposed-with-simple-sql-injection/,6/24/2011,SQL Injection,Improper Input Handling,Leakage of Information,Media,"Arlington, VA",,,,,,,,,
-2011-178,WHID 2011-178: Part II: PBS Hacked Again. Entire Database Exposed With Simple SQL Injection,"After being hacked by LulzSec several weeks ago, PBS appears to have learned nothing. A new hack by ???Warv0x??? (AKA Kaihoe) uses the same basic SQL injection technique LulzSec has been using on their many victims, and once again has exposed PBS.org???s entire database.",http://gadgetsteria.com/2011/06/24/part-ii-pbs-hacked-again-entire-database-exposed-with-simple-sql-injection/,6/24/2011,SQL Injection,Improper Input Handling,Leakage of Information,Media,"Arlington, VA",,,,,,,,,
-2011-179,WHID 2011-179: T & T Supermarket website hacked,Hackers may now have access to the personal information for 60-thousand T&T Supermarket customers.The company is warning people who used T&T's website this month.,http://www.news1130.com/news/local/article/245594--t-t-supermarket-website-hacked,6/24/2011,Unknown,Unknown,Leakage of Information,Retail,"Brampton, CA",,,,,,,,,
-2011-179,WHID 2011-179: T & T Supermarket website hacked,Hackers may now have access to the personal information for 60-thousand T&T Supermarket customers.The company is warning people who used T&T's website this month.,http://www.news1130.com/news/local/article/245594--t-t-supermarket-website-hacked,6/24/2011,Unknown,Unknown,Leakage of Information,Retail,"Brampton, CA",,,,,,,,,
-2011-17,WHID 2011-17: DNS Hack Brings Down Google Bangladesh For Many,"On Saturday, Google Bangladesh appeared to have been hacked. When some users went to the Google site, they saw a message from the TiGER-M@TE hacker group that the site was taken over.
-2011-180,"WHID 2011-180: Hackers break into Tony Blair's webmail server, disclose former PM's address book","We don't know what specific flaws were exploited in this attack, but seeing that it is a webmail server the most likely method was SQL injection. It is extremely important to keep web servers patched and up to date, especially if they are running Linux using commonly exploited CMSs, webmail solutions and blogging software.",http://nakedsecurity.sophos.com/2011/06/25/hackers-break-into-tony-blairs-webmail-server-disclose-former-pms-address-book/,6/25/2011,SQL Injection,Improper Input Handling,Leakage of Information,Hosting Providers,United Kingdom,,,,,,,,,
-2011-180,"WHID 2011-180: Hackers break into Tony Blair's webmail server, disclose former PM's address book","We don't know what specific flaws were exploited in this attack, but seeing that it is a webmail server the most likely method was SQL injection. It is extremely important to keep web servers patched and up to date, especially if they are running Linux using commonly exploited CMSs, webmail solutions and blogging software.",http://nakedsecurity.sophos.com/2011/06/25/hackers-break-into-tony-blairs-webmail-server-disclose-former-pms-address-book/,6/25/2011,SQL Injection,Improper Input Handling,Leakage of Information,Hosting Providers,United Kingdom,,,,,,,,,
-2011-181,WHID 2011-181: Anonymous hacktivists assault Turkish government websites,"Hacker group Anonymous said on Thursday it has launched DDoS (distributed denial of service) attacks on some Turkish government websites, in protest against government plans to introduce Internet filtering. The move comes a few days before Turkey holds parliamentary elections on Sunday.",http://news.techworld.com/security/3285182/anonymous-hacktivists-assault-turkish-government-websites/,6/10/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Ankara, TR",,,,,,,,,
-2011-181,WHID 2011-181: Anonymous hacktivists assault Turkish government websites,"Hacker group Anonymous said on Thursday it has launched DDoS (distributed denial of service) attacks on some Turkish government websites, in protest against government plans to introduce Internet filtering. The move comes a few days before Turkey holds parliamentary elections on Sunday.",http://news.techworld.com/security/3285182/anonymous-hacktivists-assault-turkish-government-websites/,6/10/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Ankara, TR",,,,,,,,,
-2011-182,"WHID 2011-182: Groupon India (SoSasta.com) Suffers Security Issue, User Account Information Possibly Compromised","Groupon, a leading daily deals store which entered into the Indian markets via acquisition of Kolkata based local deals shop SoSasta.com, suffered a ???security issue??? on their systems. The break-in happened over the weekend and it is highly likely that all usernames and passwords were stolen.",http://techie-buzz.com/tech-news/groupon-india-sosasta-com-suffers-security-issue-user-account-information-possibly-compromised.html,6/27/2011,Unknown,Unknown,Leakage of Information,Web 2.0,India,,,,,,,,,
-2011-182,"WHID 2011-182: Groupon India (SoSasta.com) Suffers Security Issue, User Account Information Possibly Compromised","Groupon, a leading daily deals store which entered into the Indian markets via acquisition of Kolkata based local deals shop SoSasta.com, suffered a ???security issue??? on their systems. The break-in happened over the weekend and it is highly likely that all usernames and passwords were stolen.",http://techie-buzz.com/tech-news/groupon-india-sosasta-com-suffers-security-issue-user-account-information-possibly-compromised.html,6/27/2011,Unknown,Unknown,Leakage of Information,Web 2.0,India,,,,,,,,,
-2011-183,WHID 2011-183: Mastercard blitzed again in further DDoS attack,"Updated MasterCard's website became difficult to reach on Tuesday following the launch of an apparent denial of service attack. Twitter user @ibomhacktivist claimed responsibility for the reported assault, which it said had been motivated by Mastercard's decision to suspend an account maintained by WikiLeaks in the wake of the whistle-blowing site's decision to start releasing leaked US diplomatic cables last November. Or something like that.",http://www.theregister.co.uk/2011/06/28/mastercard_ddos_again/,6/28/2011,Denial of Service,Insufficient Anti-automation,Downtime,Finance,"Cambridge, MA",,,,,,,,,
-2011-183,WHID 2011-183: Mastercard blitzed again in further DDoS attack,"Updated MasterCard's website became difficult to reach on Tuesday following the launch of an apparent denial of service attack. Twitter user @ibomhacktivist claimed responsibility for the reported assault, which it said had been motivated by Mastercard's decision to suspend an account maintained by WikiLeaks in the wake of the whistle-blowing site's decision to start releasing leaked US diplomatic cables last November. Or something like that.",http://www.theregister.co.uk/2011/06/28/mastercard_ddos_again/,6/28/2011,Denial of Service,Insufficient Anti-automation,Downtime,Finance,"Cambridge, MA",,,,,,,,,
-2011-184,WHID 2011-184: Magazine's database of US military personnel is hacked,"A magazine subscriptions database which held personal information of members of the US armed forces has been hacked into, according to an American media company.",http://www.guardian.co.uk/technology/2011/jun/29/hackers-us-military-magazine-defense-news,6/29/2011,SQL Injection,Improper Input Handling,Leakage of Information,Media,"McLean, VA",,,,,,,,,
-2011-184,WHID 2011-184: Magazine's database of US military personnel is hacked,"A magazine subscriptions database which held personal information of members of the US armed forces has been hacked into, according to an American media company.",http://www.guardian.co.uk/technology/2011/jun/29/hackers-us-military-magazine-defense-news,6/29/2011,SQL Injection,Improper Input Handling,Leakage of Information,Media,"McLean, VA",,,,,,,,,
-2011-185,WHID 2011-185: Hacking group targets Zimbabwe government website,A group known as Lulz Security (LulzSec) has announced that it has hacked into the Zimbabwe government website (http://www.gta.gov.zw) and taken material on ???everything??? there is to know about the government???s internet database.,http://www.swradioafrica.com/news290611/hacking290611.htm,6/29/2011,Unknown,Unknown,Leakage of Information,Government,"Harare, ZW",,,,,,,,,
-2011-185,WHID 2011-185: Hacking group targets Zimbabwe government website,A group known as Lulz Security (LulzSec) has announced that it has hacked into the Zimbabwe government website (http://www.gta.gov.zw) and taken material on ???everything??? there is to know about the government???s internet database.,http://www.swradioafrica.com/news290611/hacking290611.htm,6/29/2011,Unknown,Unknown,Leakage of Information,Government,"Harare, ZW",,,,,,,,,
-2011-186,WHID 2011-186: First Weibo Attack is CSRF Worm,"ZDNet China revealed that the attacker exploited a cross-site scripting (XSS) vulnerability to run a malware program in Weibo's Web pages, causing the number of affected users to increase multiple fold. While no personal information was breached, users were reminded to clear their cache for security purposes.",http://www.zdnetasia.com/no-data-breach-in-first-weibo-attack-62301014.htm,6/30/2011,Cross Site Request Forgery (CSRF),Improper Output Handling,Worm,Web 2.0,"Beijing, CN",,,,,,,,,
-2011-186,WHID 2011-186: First Weibo Attack is CSRF Worm,"ZDNet China revealed that the attacker exploited a cross-site scripting (XSS) vulnerability to run a malware program in Weibo's Web pages, causing the number of affected users to increase multiple fold. While no personal information was breached, users were reminded to clear their cache for security purposes.",http://www.zdnetasia.com/no-data-breach-in-first-weibo-attack-62301014.htm,6/30/2011,Cross Site Request Forgery (CSRF),Improper Output Handling,Worm,Web 2.0,"Beijing, CN",,,,,,,,,
-2011-187,WHID 2011-187: Hackers hit church's collection plate,"The Iowa heist is part of latest wave of cyber-crime: account takeover fraud. In it, crime gangs, many located in Eastern Europe, target small towns, community banks and civic organizations which often lack high-tech defenses.",http://www.cbsnews.com/stories/2011/06/30/eveningnews/main20075926.shtml,6/30/2011,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,"Des Moines, IA",,,,,,,,,
-2011-187,WHID 2011-187: Hackers hit church's collection plate,"The Iowa heist is part of latest wave of cyber-crime: account takeover fraud. In it, crime gangs, many located in Eastern Europe, target small towns, community banks and civic organizations which often lack high-tech defenses.",http://www.cbsnews.com/stories/2011/06/30/eveningnews/main20075926.shtml,6/30/2011,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,"Des Moines, IA",,,,,,,,,
-2011-188,WHID 2011-188: WWF site attacked again; hacker leaves 'tips',"Two days after a hacker defaced its site, the World Wildlife Fund Philippine chapter suffered another attack Friday, with the hacker leaving behind tips to improve its security.",http://www.gmanews.tv/story/224956/technologoy/wwf-site-attacked-again-hacker-leaves-tips,7/1/2011,SQL Injection,Improper Input Handling,Leakage of Information,Politics,"Provo, US",,,,,,,,,
-2011-188,WHID 2011-188: WWF site attacked again; hacker leaves 'tips',"Two days after a hacker defaced its site, the World Wildlife Fund Philippine chapter suffered another attack Friday, with the hacker leaving behind tips to improve its security.",http://www.gmanews.tv/story/224956/technologoy/wwf-site-attacked-again-hacker-leaves-tips,7/1/2011,SQL Injection,Improper Input Handling,Leakage of Information,Politics,"Provo, US",,,,,,,,,
-2011-189,WHID 2011-189: Anonymous Teases SQL-Based Apple Hack With 27 Stolen Account Names,"Three hours ago Anonymous tweeted that they managed to steal 27 usernames and passwords from Apple.com (from this link here) when attacked with a basic SQL injection. Now, at this time only 27 accounts have been compromised and they aren???t usernames pertaining to the public. Nonetheless, it???s alarming given Apple???s claims about security ??? to be hacked using a simple SQL based method ??? as well as the fact that Anonymous claims Apple could be their next target.",http://gadgetsteria.com/2011/07/03/anonymous-teases-sql-based-apple-hack-with-27-stolen-account-names-says-they-could-be-next-target/,7/3/2011,SQL Injection,Improper Input Handling,Leakage of Information,Technology,"Cupertino, US",,,,,,,,,
-2011-189,WHID 2011-189: Anonymous Teases SQL-Based Apple Hack With 27 Stolen Account Names,"Three hours ago Anonymous tweeted that they managed to steal 27 usernames and passwords from Apple.com (from this link here) when attacked with a basic SQL injection. Now, at this time only 27 accounts have been compromised and they aren???t usernames pertaining to the public. Nonetheless, it???s alarming given Apple???s claims about security ??? to be hacked using a simple SQL based method ??? as well as the fact that Anonymous claims Apple could be their next target.",http://gadgetsteria.com/2011/07/03/anonymous-teases-sql-based-apple-hack-with-27-stolen-account-names-says-they-could-be-next-target/,7/3/2011,SQL Injection,Improper Input Handling,Leakage of Information,Technology,"Cupertino, US",,,,,,,,,
-2011-18,WHID 2011-18: French president recovers from Facebook hack,The Facebook account of Nicolas Sarkozy was hacked over the weekend to post the false rumour that the French president would not seek re-election next year.,http://www.theregister.co.uk/2011/01/24/french_pres_facebook_hack/,1/24/2011,Stolen Credentials,Insufficient Authentication,Disinformation,Web 2.0,"Palo Alto, CA",No,,,,Facebook,,,,
-2011-18,WHID 2011-18: French president recovers from Facebook hack,The Facebook account of Nicolas Sarkozy was hacked over the weekend to post the false rumour that the French president would not seek re-election next year.,http://www.theregister.co.uk/2011/01/24/french_pres_facebook_hack/,1/24/2011,Stolen Credentials,Insufficient Authentication,Disinformation,Web 2.0,"Palo Alto, CA",No,,,,Facebook,,,,
-2011-190,"WHID 2011-190: Hacker group ???hijacks??? news site???s Twitter account, claims Obama is dead","For some hours Monday, a hacker group ""hijacked"" the Twitter account of US-based news outfit Fox News, using its Twitter account to post fake messages, including those that claimed US President Barack Obama II was shot dead.",http://www.gmanews.tv/story/225234/technology/hacker-group-hijacks-news-sites-twitter-account-claims-obama-is-dead,7/4/2011,Unknown,Unknown,Disinformation,Web 2.0,"San Francisco, US",,,,,,,,,
-2011-190,"WHID 2011-190: Hacker group ???hijacks??? news site???s Twitter account, claims Obama is dead","For some hours Monday, a hacker group ""hijacked"" the Twitter account of US-based news outfit Fox News, using its Twitter account to post fake messages, including those that claimed US President Barack Obama II was shot dead.",http://www.gmanews.tv/story/225234/technology/hacker-group-hijacks-news-sites-twitter-account-claims-obama-is-dead,7/4/2011,Unknown,Unknown,Disinformation,Web 2.0,"San Francisco, US",,,,,,,,,
-2011-191,WHID 2011-191: Sony Music Ireland website hacked,Sony Music Ireland has said it is looking into an incident on its website after three fake news stories appeared on its homepage this morning. The website has been removed and the www.sonymusic.ie domain is re-directing to the company's Facebook page.,http://www.rte.ie/news/2011/0705/sony.html,7/5/2011,Unknown,Unknown,Disinformation,Entertainment,"McLean, VA",,,,,,,,,
-2011-191,WHID 2011-191: Sony Music Ireland website hacked,Sony Music Ireland has said it is looking into an incident on its website after three fake news stories appeared on its homepage this morning. The website has been removed and the www.sonymusic.ie domain is re-directing to the company's Facebook page.,http://www.rte.ie/news/2011/0705/sony.html,7/5/2011,Unknown,Unknown,Disinformation,Entertainment,"McLean, VA",,,,,,,,,
-2011-192,WHID 2011-192: PayPal UK Twitter account hacked,A disgruntled customer appears to have taken control of PayPal UK's Twitter account and has used it to complain about the service in a series of angry tweets on the service.,http://www.guardian.co.uk/technology/blog/2011/jul/05/paypal-uk-twitter-hack-customer,7/5/2011,Unknown,Unknown,Account Takeover,Retail,"San Francisco, CA",,,,,,,,,
-2011-192,WHID 2011-192: PayPal UK Twitter account hacked,A disgruntled customer appears to have taken control of PayPal UK's Twitter account and has used it to complain about the service in a series of angry tweets on the service.,http://www.guardian.co.uk/technology/blog/2011/jul/05/paypal-uk-twitter-hack-customer,7/5/2011,Unknown,Unknown,Account Takeover,Retail,"San Francisco, CA",,,,,,,,,
-2011-193,WHID 2011-193: Washington Post Jobs website hacked,"The Post says the hackers obtained user IDs and e-mail addresses, but ???no passwords or other personal information was affected.??? The paper is pursuing the matter with law enforcement. A letter to customers about the hack is after the jump.",http://www.poynter.org/latest-news/romenesko/138263/washington-post-jobs-website-hacked/,7/7/2011,Unknown,Unknown,Leakage of Information,Media,USA,,,,,,,,,
-2011-193,WHID 2011-193: Washington Post Jobs website hacked,"The Post says the hackers obtained user IDs and e-mail addresses, but ???no passwords or other personal information was affected.??? The paper is pursuing the matter with law enforcement. A letter to customers about the hack is after the jump.",http://www.poynter.org/latest-news/romenesko/138263/washington-post-jobs-website-hacked/,7/7/2011,Unknown,Unknown,Leakage of Information,Media,USA,,,,,,,,,
-2011-194,"WHID 2011-194: Hacker tries to steal $83,000 from Atascadero city bank account","???We???re still trying to uncover all the details,??? said McKinney, ???but it looks like we got a virus in one of the computers, then when we connected with Rabobank for a wire transfer, it got mirrored and sent out other transfers. We???re looking into how it got around all of the security measures.??? Read more: http://www.sanluisobispo.com/2011/07/07/1674252/atascadero-bank-account-hacked.html#ixzz1VmEgzLAp",http://www.sanluisobispo.com/2011/07/07/1674252/atascadero-bank-account-hacked.html,7/8/2011,Banking Trojan,Insufficient Anti-automation,Monetary Loss,Finance,"Atascadero, CA",,,,,,,,,
-2011-194,"WHID 2011-194: Hacker tries to steal $83,000 from Atascadero city bank account","???We???re still trying to uncover all the details,??? said McKinney, ???but it looks like we got a virus in one of the computers, then when we connected with Rabobank for a wire transfer, it got mirrored and sent out other transfers. We???re looking into how it got around all of the security measures.??? Read more: http://www.sanluisobispo.com/2011/07/07/1674252/atascadero-bank-account-hacked.html#ixzz1VmEgzLAp",http://www.sanluisobispo.com/2011/07/07/1674252/atascadero-bank-account-hacked.html,7/8/2011,Banking Trojan,Insufficient Anti-automation,Monetary Loss,Finance,"Atascadero, CA",,,,,,,,,
-2011-195,WHID 2011-195: Florida Election Servers Hacked Again,"For the second time in a week, a hacker has broken into systems connected with voting in Florida, stolen data, and released it to the public.",http://www.informationweek.com/news/security/attacks/231001248,7/8/2011,SQL Injection,Improper Input Handling,Leakage of Information,Government,Florida,,,,,,,,,
-2011-195,WHID 2011-195: Florida Election Servers Hacked Again,"For the second time in a week, a hacker has broken into systems connected with voting in Florida, stolen data, and released it to the public.",http://www.informationweek.com/news/security/attacks/231001248,7/8/2011,SQL Injection,Improper Input Handling,Leakage of Information,Government,Florida,,,,,,,,,
-2011-196,"WHID 2011-196: Kiplinger Warns Customers Hackers Got Account, Credit Card Information","Kiplinger Washington Editors Inc., the publisher of Kiplinger???s Personal Finance, warned customers that hackers breached its computer network at least as early as June 25 and stole account data, including credit card numbers.",http://www.bloomberg.com/news/2011-07-08/kiplinger-warns-customers-hackers-got-account-information-1-.html,7/9/2011,Unknown,Unknown,Leakage of Information,Finance,"Washington, DC",,,,,,,,,
-2011-196,"WHID 2011-196: Kiplinger Warns Customers Hackers Got Account, Credit Card Information","Kiplinger Washington Editors Inc., the publisher of Kiplinger???s Personal Finance, warned customers that hackers breached its computer network at least as early as June 25 and stole account data, including credit card numbers.",http://www.bloomberg.com/news/2011-07-08/kiplinger-warns-customers-hackers-got-account-information-1-.html,7/9/2011,Unknown,Unknown,Leakage of Information,Finance,"Washington, DC",,,,,,,,,
-2011-197,2011-197: Anonymous Hackers Attack Government-Contracted Company IRC Federal,"The group incapacitated IRC Federal???s website with a Denial of Service (DoS) attack early on July 8, and simultaneously breached the website???s networks. They also posted information stolen in the cyber-attack on PasteBin, a text posting website.",http://www.theepochtimes.com/n2/technology/anonymous-hackers-attack-government-affiliated-company-irc-federal-58864.html,7/9/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Scottsdale, AZ",,,,,,,,,
-2011-197,2011-197: Anonymous Hackers Attack Government-Contracted Company IRC Federal,"The group incapacitated IRC Federal???s website with a Denial of Service (DoS) attack early on July 8, and simultaneously breached the website???s networks. They also posted information stolen in the cyber-attack on PasteBin, a text posting website.",http://www.theepochtimes.com/n2/technology/anonymous-hackers-attack-government-affiliated-company-irc-federal-58864.html,7/9/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Scottsdale, AZ",,,,,,,,,
-2011-198,WHID 2011-198: AntiSec leaks secret IRC Federal security data,"According to the Pastebin post, the members of Anonymous who are involved in the AntiSec hacking campaign were able to gain initial access to IRC Federal by using a SQL injection attack.",http://blogs.computerworld.com/18593/anonymous_hacks_fbi_contractor_antisec_leaks_secret_irc_federal_security_data?source=rss_blogs,7/10/2011,SQL Injection,Improper Input Handling,Leakage of Information,Government,"Washington, DC",,,,,,,,,
-2011-198,WHID 2011-198: AntiSec leaks secret IRC Federal security data,"According to the Pastebin post, the members of Anonymous who are involved in the AntiSec hacking campaign were able to gain initial access to IRC Federal by using a SQL injection attack.",http://blogs.computerworld.com/18593/anonymous_hacks_fbi_contractor_antisec_leaks_secret_irc_federal_security_data?source=rss_blogs,7/10/2011,SQL Injection,Improper Input Handling,Leakage of Information,Government,"Washington, DC",,,,,,,,,
-2011-199,WHID 2011-199: Lady Gaga website hacked and fans' details stolen,LADY Gaga has called in police after thousands of her fans??? personal details were stolen from her website. Her record label Univeral acted after the site was hacked into by US cyber attackers SwagSec. Read more: http://www.mirror.co.uk/celebs/news/2011/07/16/lady-gaga-website-hacked-and-fans-details-stolen-115875-23274356/#ixzz1VmgaY2wp Go Camping for 95p! Vouchers collectable in the Daily and Sunday Mirror until 11th August . Click here for more information,http://www.mirror.co.uk/celebs/news/2011/07/16/lady-gaga-website-hacked-and-fans-details-stolen-115875-23274356/,7/16/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,United Kingdom,,,,,,,,,
-2011-199,WHID 2011-199: Lady Gaga website hacked and fans' details stolen,LADY Gaga has called in police after thousands of her fans??? personal details were stolen from her website. Her record label Univeral acted after the site was hacked into by US cyber attackers SwagSec. Read more: http://www.mirror.co.uk/celebs/news/2011/07/16/lady-gaga-website-hacked-and-fans-details-stolen-115875-23274356/#ixzz1VmgaY2wp Go Camping for 95p! Vouchers collectable in the Daily and Sunday Mirror until 11th August . Click here for more information,http://www.mirror.co.uk/celebs/news/2011/07/16/lady-gaga-website-hacked-and-fans-details-stolen-115875-23274356/,7/16/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,United Kingdom,,,,,,,,,
-2011-19,WHID 2011-19: Living Social Hacked (Update),"Living Social doesn't do server side quantity validation (at least they didn't yesterday). Who cares you say? Well Amazon.com for one. Their latest offer of a $20 gift certificate for $10 has the explicit restriction of ONE per customer and no gifts. You see, Amazon actually only wants to discount their product for new customers or existing customers only on $20 of merchandise. If Amazon knew there was a way to buy say 100 vouchers and receive $2000 of Amazon merchandise for $1000, they would probably blow a gasket.",http://www.deepgreencrystals.com/archives/2011/01/living-social-h.html,1/19/2011,Hidden Parameter Manipulation,Improper Input Handling,Monetary Loss,Retail,,No,,,,,,,,
-2011-19,WHID 2011-19: Living Social Hacked (Update),"Living Social doesn't do server side quantity validation (at least they didn't yesterday). Who cares you say? Well Amazon.com for one. Their latest offer of a $20 gift certificate for $10 has the explicit restriction of ONE per customer and no gifts. You see, Amazon actually only wants to discount their product for new customers or existing customers only on $20 of merchandise. If Amazon knew there was a way to buy say 100 vouchers and receive $2000 of Amazon merchandise for $1000, they would probably blow a gasket.",http://www.deepgreencrystals.com/archives/2011/01/living-social-h.html,1/19/2011,Hidden Parameter Manipulation,Improper Input Handling,Monetary Loss,Retail,,No,,,,,,,,
-2011-1,WHID 2011-1: Hackers hit Tunisian websites,"Online activists have attacked and at least momentarily disabled several Tunisian government websites in the latest act of protest against the country's embattled leadership.
-2011-200,WHID 2011-200: Toshiba: US Unit's Server Has Been Hacked,TOKYO (Dow Jones)-Toshiba Corp. (6502.TO) said Saturday that its U.S. sales subsidiary's server has been hacked and e-mail addresses and passwords for 681 customers have been compromised. Read more: http://www.foxbusiness.com/industries/2011/07/16/toshiba-us-units-server-has-been-hacked/#ixzz1VmhuIq1l,http://www.foxbusiness.com/industries/2011/07/16/toshiba-us-units-server-has-been-hacked/,7/16/2011,Unknown,Unknown,Leakage of Information,Technology,"Irvine, CA",,,,,,,,,
-2011-200,WHID 2011-200: Toshiba: US Unit's Server Has Been Hacked,TOKYO (Dow Jones)-Toshiba Corp. (6502.TO) said Saturday that its U.S. sales subsidiary's server has been hacked and e-mail addresses and passwords for 681 customers have been compromised. Read more: http://www.foxbusiness.com/industries/2011/07/16/toshiba-us-units-server-has-been-hacked/#ixzz1VmhuIq1l,http://www.foxbusiness.com/industries/2011/07/16/toshiba-us-units-server-has-been-hacked/,7/16/2011,Unknown,Unknown,Leakage of Information,Technology,"Irvine, CA",,,,,,,,,
-2011-201,WHID 2011-201: Hacked SBS links to risky content,"The website of the Special Broadcasting Service (SBS) has been victim of a hacking attack over the weekend, with users visiting the site exposed to malware.",http://www.zdnet.com.au/hacked-sbs-links-to-risky-content-339318734.htm,7/18/2011,Unknown,Improper Output Handling,Planting of Malware,Media,"Findon, AU",,,,,,,,,
-2011-201,WHID 2011-201: Hacked SBS links to risky content,"The website of the Special Broadcasting Service (SBS) has been victim of a hacking attack over the weekend, with users visiting the site exposed to malware.",http://www.zdnet.com.au/hacked-sbs-links-to-risky-content-339318734.htm,7/18/2011,Unknown,Improper Output Handling,Planting of Malware,Media,"Findon, AU",,,,,,,,,
-2011-202,WHID 2011-202: LulzSec Hacks The Times with Brutal Murdoch Death Notice,"Well, seems like LulzSec has returned, and moved beyond the DDOS attack! Not content to merely shut down one of Rupert Murdoch's paper's websites, the hacking group has instead planted a bizarro-Onionesque account of the mogul's death-by-palladium on a Times redesign page masquerading as The Sun.",http://gizmodo.com/5822392/anonymous-hacks-the-sun-with-brutal-murdoch-death-notice,7/18/2011,Local File Inclusion (LFI),Improper Input Handling,Disinformation,Media,USA,,,,,,,,,
-2011-202,WHID 2011-202: LulzSec Hacks The Times with Brutal Murdoch Death Notice,"Well, seems like LulzSec has returned, and moved beyond the DDOS attack! Not content to merely shut down one of Rupert Murdoch's paper's websites, the hacking group has instead planted a bizarro-Onionesque account of the mogul's death-by-palladium on a Times redesign page masquerading as The Sun.",http://gizmodo.com/5822392/anonymous-hacks-the-sun-with-brutal-murdoch-death-notice,7/18/2011,Local File Inclusion (LFI),Improper Input Handling,Disinformation,Media,USA,,,,,,,,,
-2011-203,WHID 2011-203: Anonymous hacks NATO servers,"A simple SQL injection was apparently all it took to break into the server. Anonymous says that it will be putting more ""interesting data"" online over the next few days.",http://www.h-online.com/security/news/item/Anonymous-hacks-NATO-servers-1284000.html,7/22/2011,SQL Injection,Improper Input Handling,Leakage of Information,Politics,"Brussels, BE",,,,,,,,,
-2011-203,WHID 2011-203: Anonymous hacks NATO servers,"A simple SQL injection was apparently all it took to break into the server. Anonymous says that it will be putting more ""interesting data"" online over the next few days.",http://www.h-online.com/security/news/item/Anonymous-hacks-NATO-servers-1284000.html,7/22/2011,SQL Injection,Improper Input Handling,Leakage of Information,Politics,"Brussels, BE",,,,,,,,,
-2011-204,WHID 2011-204: LiveJournal groans under 'immense' DDos attack,LiveJournal is weathering a massive web attack that has meant service disruptions for people who read and write the more than 16 million journals hosted on the community and blogging service.,http://www.theregister.co.uk/2011/07/27/livejournal_ddos_attack/,6/27/2011,Denial of Service,Insufficient Anti-automation,Downtime,Web 2.0,"San Francisco, US",,,,,,,,,
-2011-204,WHID 2011-204: LiveJournal groans under 'immense' DDos attack,LiveJournal is weathering a massive web attack that has meant service disruptions for people who read and write the more than 16 million journals hosted on the community and blogging service.,http://www.theregister.co.uk/2011/07/27/livejournal_ddos_attack/,6/27/2011,Denial of Service,Insufficient Anti-automation,Downtime,Web 2.0,"San Francisco, US",,,,,,,,,
-2011-205,WHID 2011-205: Sneaky Trojan exploits e-commerce flaws,"More details have emerged of an e-commerce software flaw linked to the theft of credit card information from numerous websites. A security flaw in osCommerce, an open source e-commerce package, created a means for criminals to compromise 90,000 web pages with redirection scripts that ultimately directed surfers towards a site serving up an exploit toolkit designed to compromise visitors' PCs.",http://www.theregister.co.uk/2011/08/01/banking_trojan_exploits_ecommerce_website_flaws/,8/1/2011,Directory Traversal,Improper Input Handling,Planting of Malware,Retail,,Yes,osCommerce Flaw,90000,,osCommerce,,,,
-2011-205,WHID 2011-205: Sneaky Trojan exploits e-commerce flaws,"More details have emerged of an e-commerce software flaw linked to the theft of credit card information from numerous websites. A security flaw in osCommerce, an open source e-commerce package, created a means for criminals to compromise 90,000 web pages with redirection scripts that ultimately directed surfers towards a site serving up an exploit toolkit designed to compromise visitors' PCs.",http://www.theregister.co.uk/2011/08/01/banking_trojan_exploits_ecommerce_website_flaws/,8/1/2011,Directory Traversal,Improper Input Handling,Planting of Malware,Retail,,Yes,osCommerce Flaw,90000,,osCommerce,,,,
-2011-206,WHID 2011-206: Anonymous attacks PasteBin to test new DDoS attack tool,"Anonymous is building a bigger, more vicious weapon to replace its current DDoS tool. The new attack program, called #RefRef, is being developed in time for the Blackhat conference in Las Vegas and was recently tested on the currently unhappy Pastebin website.",http://www.digitaltrends.com/web/anonymous-attacks-pastebin-to-test-new-ddos-attack-tool/,8/2/2011,Denial of Service,Improper Input Handling,Downtime,Technology,,,,,,,,,,
-2011-206,WHID 2011-206: Anonymous attacks PasteBin to test new DDoS attack tool,"Anonymous is building a bigger, more vicious weapon to replace its current DDoS tool. The new attack program, called #RefRef, is being developed in time for the Blackhat conference in Las Vegas and was recently tested on the currently unhappy Pastebin website.",http://www.digitaltrends.com/web/anonymous-attacks-pastebin-to-test-new-ddos-attack-tool/,8/2/2011,Denial of Service,Improper Input Handling,Downtime,Technology,,,,,,,,,,
-2011-207,WHID 2011-207: Hershey's Website Hacked... To Change Recipe,"While a number of websites and mailing lists have fallen victim to attacks intent on stealing personal information or just proving that the hack was possible, whoever managed to penetrate the security of the Hershey's Chocolate website had a much more insidious goal: changing recipes.",http://consumerist.com/2011/08/hersheys-website-hacked-to-change-recipe.html,8/3/2011,Unknown,Unknown,Disinformation,Retail,Cambridge. MA,,,,,,,,,
-2011-207,WHID 2011-207: Hershey's Website Hacked... To Change Recipe,"While a number of websites and mailing lists have fallen victim to attacks intent on stealing personal information or just proving that the hack was possible, whoever managed to penetrate the security of the Hershey's Chocolate website had a much more insidious goal: changing recipes.",http://consumerist.com/2011/08/hersheys-website-hacked-to-change-recipe.html,8/3/2011,Unknown,Unknown,Disinformation,Retail,Cambridge. MA,,,,,,,,,
-2011-208,WHID 2011-208: Morocco: Activist Website Sustains DDoS Attack,"The Moroccan activist website Mamfakinch! came under a distributed denial-of-service (DDoS) attack on Sunday 31 July, 2011, which blocked access to its main platform for several hours. The website is now back online.",http://globalvoicesonline.org/2011/08/03/morocco-militant-website-sustains-ddos-attack/,7/31/2011,Denial of Service,Insufficient Anti-automation,Downtime,Politics,"San Francisco, CA",,,,,,,,,
-2011-208,WHID 2011-208: Morocco: Activist Website Sustains DDoS Attack,"The Moroccan activist website Mamfakinch! came under a distributed denial-of-service (DDoS) attack on Sunday 31 July, 2011, which blocked access to its main platform for several hours. The website is now back online.",http://globalvoicesonline.org/2011/08/03/morocco-militant-website-sustains-ddos-attack/,7/31/2011,Denial of Service,Insufficient Anti-automation,Downtime,Politics,"San Francisco, CA",,,,,,,,,
-2011-209,WHID 2011-209: Over 100 Indian Govt. Websites Defaced Since January,"A total of 117 Indian government websites were defaced by hackers from January to June this year, prompting the government to take additional security measures, a federal minister told Parliament.",http://www.pcworld.com/businesscenter/article/237286/over_100_indian_govt_websites_defaced_since_january.html,8/4/2011,Unknown,Improper Output Handling,Defacement,Government,India,Yes,,117,,,,,,
-2011-209,WHID 2011-209: Over 100 Indian Govt. Websites Defaced Since January,"A total of 117 Indian government websites were defaced by hackers from January to June this year, prompting the government to take additional security measures, a federal minister told Parliament.",http://www.pcworld.com/businesscenter/article/237286/over_100_indian_govt_websites_defaced_since_january.html,8/4/2011,Unknown,Improper Output Handling,Defacement,Government,India,Yes,,117,,,,,,
-2011-20,WHID 2011-20: Hackers Get Access to New Jersey School Data System,Users of the 4chan online message board managed to get access to the online student information system used by a New Jersey school district after the school's administrative password was posted to 4chan last week.,http://www.pcworld.com/businesscenter/article/217601/hackers_get_access_to_new_jersey_school_data_system.html,1/24/2011,Brute Force,Insufficient Anti-automation,Session Hijacking,Education,New Jersey,No,,,,,,,,
-2011-20,WHID 2011-20: Hackers Get Access to New Jersey School Data System,Users of the 4chan online message board managed to get access to the online student information system used by a New Jersey school district after the school's administrative password was posted to 4chan last week.,http://www.pcworld.com/businesscenter/article/217601/hackers_get_access_to_new_jersey_school_data_system.html,1/24/2011,Brute Force,Insufficient Anti-automation,Session Hijacking,Education,New Jersey,No,,,,,,,,
-2011-210,WHID 2011-210: Zimbabwe Stock Exchange website hacked,"The Zimbabwe Stock Exchange's website has been hacked, forcing the ZSE to temporarily close the website pending investigations and maintenance of the site.",http://bulawayo24.com/index-id-news-sc-national-byo-6207-article-zimbabwe+stock+exchange+website+hacked.html,8/4/2011,Unknown,Unknown,Downtime,Finance,"Harare, ZW",,,,,,,,,
-2011-210,WHID 2011-210: Zimbabwe Stock Exchange website hacked,"The Zimbabwe Stock Exchange's website has been hacked, forcing the ZSE to temporarily close the website pending investigations and maintenance of the site.",http://bulawayo24.com/index-id-news-sc-national-byo-6207-article-zimbabwe+stock+exchange+website+hacked.html,8/4/2011,Unknown,Unknown,Downtime,Finance,"Harare, ZW",,,,,,,,,
-2011-211,WHID 2011-211: North Korean Hackers Stealing Gaming Money for Government,"North Korea's cash-strapped government has begun deploying hackers who pilfer points at South Korean gaming sites which they then convert into cash, according to The New York Times.",http://www.ibtimes.com/articles/193025/20110805/north-korean-hackers-north-korea-gaming-korea-gaming-hackers-south-korea-online-gaming-chinese-gold.htm,8/5/2011,Process Automation,Insufficient Anti-automation,Monetary Loss,Entertainment,South Korea,,,,,,,,,
-2011-211,WHID 2011-211: North Korean Hackers Stealing Gaming Money for Government,"North Korea's cash-strapped government has begun deploying hackers who pilfer points at South Korean gaming sites which they then convert into cash, according to The New York Times.",http://www.ibtimes.com/articles/193025/20110805/north-korean-hackers-north-korea-gaming-korea-gaming-hackers-south-korea-online-gaming-chinese-gold.htm,8/5/2011,Process Automation,Insufficient Anti-automation,Monetary Loss,Entertainment,South Korea,,,,,,,,,
-2011-212,WHID 2011-212: AntiSec hackers dump data after hacking police websites,"AntiSec said that it had compromised servers at Brooks-Jeffrey, a Mountain Home, Ark. company that runs a computer store and online marketing firm. Brooks-Jeffrey Marketing builds websites for sheriff's agencies throughout the southern United States. ""It took less than 24 hours to root BJM's server and copy all their data to our private servers,"" AntiSec said in a statement posted Saturday.",http://www.computerworld.com/s/article/9218961/AntiSec_hackers_dump_data_after_hacking_police_websites,8/7/2011,Unknown,Unknown,Leakage of Information,Law Enforcement,,Yes,AntiSec,,,,,,,
-2011-212,WHID 2011-212: AntiSec hackers dump data after hacking police websites,"AntiSec said that it had compromised servers at Brooks-Jeffrey, a Mountain Home, Ark. company that runs a computer store and online marketing firm. Brooks-Jeffrey Marketing builds websites for sheriff's agencies throughout the southern United States. ""It took less than 24 hours to root BJM's server and copy all their data to our private servers,"" AntiSec said in a statement posted Saturday.",http://www.computerworld.com/s/article/9218961/AntiSec_hackers_dump_data_after_hacking_police_websites,8/7/2011,Unknown,Unknown,Leakage of Information,Law Enforcement,,Yes,AntiSec,,,,,,,
-2011-213,WHID 2011-213: Malware Wave Infects Six Million e-Commerce Pages,"A malware infection, based on known flaws, has hit millions of e-commerce Web pages in the past two weeks",http://www.eweekeurope.co.uk/news/malware-wave-infects-six-million-e-commerce-pages-36281,8/8/2011,Known Vulnerability,Application Misconfiguration,Planting of Malware,Multiple,Multiple,Yes,Willysy,,,osCommerce,,,,
-2011-213,WHID 2011-213: Malware Wave Infects Six Million e-Commerce Pages,"A malware infection, based on known flaws, has hit millions of e-commerce Web pages in the past two weeks",http://www.eweekeurope.co.uk/news/malware-wave-infects-six-million-e-commerce-pages-36281,8/8/2011,Known Vulnerability,Application Misconfiguration,Planting of Malware,Multiple,Multiple,Yes,Willysy,,,osCommerce,,,,
-2011-214,WHID 2011-214: BlackBerry blog hacked with riot-related threats,RIM's corporate blog has been defaced with threats as part of a protest against the BlackBerry maker's plans to hand over information on London rioters to the police.,http://www.theregister.co.uk/2011/08/09/blackberry_blog_riot_hack/,8/9/2011,Unknown,Improper Output Handling,Defacement,Technology,"Plano, TX",,,,,,,,,
-2011-214,WHID 2011-214: BlackBerry blog hacked with riot-related threats,RIM's corporate blog has been defaced with threats as part of a protest against the BlackBerry maker's plans to hand over information on London rioters to the police.,http://www.theregister.co.uk/2011/08/09/blackberry_blog_riot_hack/,8/9/2011,Unknown,Improper Output Handling,Defacement,Technology,"Plano, TX",,,,,,,,,
-2011-215,WHID 2011-215: Hacker group hits NASA site,"Meanwhile, TeaMp0isoN attacked the NASA discussion forum, saying it is vulnerable to SQL injection.",http://www.thehackernews.com/2011/08/teamp0ison-nasa-forum-is-vulnerable-sql.html,8/9/2011,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2011-215,WHID 2011-215: Hacker group hits NASA site,"Meanwhile, TeaMp0isoN attacked the NASA discussion forum, saying it is vulnerable to SQL injection.",http://www.thehackernews.com/2011/08/teamp0ison-nasa-forum-is-vulnerable-sql.html,8/9/2011,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2011-216,WHID 2011-216: Potential account theft with XSS hole in eBay.de,A serious security hole in eBay.de enabled attackers to steal other users' cookies and take control of their accounts. It is not believed that this particular flaw affected any other national eBay sites.,http://www.h-online.com/security/news/item/Potential-account-theft-with-XSS-hole-in-eBay-de-1320908.html,8/10/2011,Cross Site Scripting (XSS),Improper Output Handling,Session Hijacking,Web 2.0,"Campbell, CA",,,,,,,,,
-2011-216,WHID 2011-216: Potential account theft with XSS hole in eBay.de,A serious security hole in eBay.de enabled attackers to steal other users' cookies and take control of their accounts. It is not believed that this particular flaw affected any other national eBay sites.,http://www.h-online.com/security/news/item/Potential-account-theft-with-XSS-hole-in-eBay-de-1320908.html,8/10/2011,Cross Site Scripting (XSS),Improper Output Handling,Session Hijacking,Web 2.0,"Campbell, CA",,,,,,,,,
-2011-217,WHID 2011-217: Hong Kong stock exchange website hacked,"The Hong Kong stock exchange was forced to suspend trading in stocks including HSBC Holdings after hackers broke into the exchange's website on Wednesday, preventing investors from accessing company announcements made during the midday break.",http://www.ciol.com/Global-News/Global-News/News-Reports/Hong-Kong-stock-exchange-website-hacked/153268/0/,8/10/2011,Denial of Service,Insufficient Anti-automation,Downtime,Finance,Hong Kong,,,,,,,,,
-2011-217,WHID 2011-217: Hong Kong stock exchange website hacked,"The Hong Kong stock exchange was forced to suspend trading in stocks including HSBC Holdings after hackers broke into the exchange's website on Wednesday, preventing investors from accessing company announcements made during the midday break.",http://www.ciol.com/Global-News/Global-News/News-Reports/Hong-Kong-stock-exchange-website-hacked/153268/0/,8/10/2011,Denial of Service,Insufficient Anti-automation,Downtime,Finance,Hong Kong,,,,,,,,,
-2011-218,"WHID 2011-218: Anonymous defaces BART site, leaks user data","Anonymous has apparently made good on a promise to wreak havoc on the Web site of the Bay Area Rapid Transit System today, although not exactly as planned. Read more: http://news.cnet.com/8301-1023_3-20092221-93/anonymous-defaces-bart-site-leaks-user-data/#ixzz1VyASpfWT",http://news.cnet.com/8301-1023_3-20092221-93/anonymous-defaces-bart-site-leaks-user-data/,8/14/2011,Unknown,Improper Output Handling,Defacement,Government,"Oakland, CA",,,,,,,,,
-2011-218,"WHID 2011-218: Anonymous defaces BART site, leaks user data","Anonymous has apparently made good on a promise to wreak havoc on the Web site of the Bay Area Rapid Transit System today, although not exactly as planned. Read more: http://news.cnet.com/8301-1023_3-20092221-93/anonymous-defaces-bart-site-leaks-user-data/#ixzz1VyASpfWT",http://news.cnet.com/8301-1023_3-20092221-93/anonymous-defaces-bart-site-leaks-user-data/,8/14/2011,Unknown,Improper Output Handling,Defacement,Government,"Oakland, CA",,,,,,,,,
-2011-219,"WHID 2011-219: Anonymous hacks BART, creating even more innocent victims","They performed a SQL injection (SQLi) attack against the site and were able to extract more than 2,000 records containing names, usernames, passwords (plain text), emails, phone numbers, addresses and zip codes.",http://nakedsecurity.sophos.com/2011/08/15/anonymous-hacks-bart-creating-even-more-innocent-victims/,8/14/2011,SQL Injection,Improper Input Handling,Leakage of Information,Government,"Oakland, CA",,,,,,,,,
-2011-219,"WHID 2011-219: Anonymous hacks BART, creating even more innocent victims","They performed a SQL injection (SQLi) attack against the site and were able to extract more than 2,000 records containing names, usernames, passwords (plain text), emails, phone numbers, addresses and zip codes.",http://nakedsecurity.sophos.com/2011/08/15/anonymous-hacks-bart-creating-even-more-innocent-victims/,8/14/2011,SQL Injection,Improper Input Handling,Leakage of Information,Government,"Oakland, CA",,,,,,,,,
-2011-21,WHID 2011-21: Fedora servers breached after external compromise,"On January 22, 2011 a Fedora contributor received an email from the Fedora
-2011-220,WHID 2011-220: Hacker used social media to steal from neighbours' accounts,"A hacker used social networking sites Facebook and Friends Reunited to crack passwords used by his neighbours for online banking services, and stole ??35,000 over two years. Read more: http://www.computing.co.uk/ctg/news/2101779/hacker-social-media-steal-neighbours-accounts#ixzz1VyFC9D5A Computing - Insight for IT leaders Claim your free subscription today.",http://www.computing.co.uk/ctg/news/2101779/hacker-social-media-steal-neighbours-accounts,8/15/2011,Brute Force,Insufficient Password Recovery,Account Takeover,Finance,,,,,,,,,,
-2011-220,WHID 2011-220: Hacker used social media to steal from neighbours' accounts,"A hacker used social networking sites Facebook and Friends Reunited to crack passwords used by his neighbours for online banking services, and stole ??35,000 over two years. Read more: http://www.computing.co.uk/ctg/news/2101779/hacker-social-media-steal-neighbours-accounts#ixzz1VyFC9D5A Computing - Insight for IT leaders Claim your free subscription today.",http://www.computing.co.uk/ctg/news/2101779/hacker-social-media-steal-neighbours-accounts,8/15/2011,Brute Force,Insufficient Password Recovery,Account Takeover,Finance,,,,,,,,,,
-2011-221,"WHID 2011-221: French newspaper Le Devoir hacked, posts fake story about Charest's death",The website for the French-language newspaper Le Devoir was hacked early Tuesday morning. Whoever took over the newspaper site published an article stating that Premier Jean Charest had died of a heart attack -- something which is completely false.,http://montreal.ctv.ca/servlet/an/local/CTVNews/20110816/mtl_ledevoir_110816/20110816/?hub=MontrealHome,8/16/2011,Unknown,Insufficient Process Validation,Disinformation,Media,"Montreal, CA",,,,,,,,,
-2011-221,"WHID 2011-221: French newspaper Le Devoir hacked, posts fake story about Charest's death",The website for the French-language newspaper Le Devoir was hacked early Tuesday morning. Whoever took over the newspaper site published an article stating that Premier Jean Charest had died of a heart attack -- something which is completely false.,http://montreal.ctv.ca/servlet/an/local/CTVNews/20110816/mtl_ledevoir_110816/20110816/?hub=MontrealHome,8/16/2011,Unknown,Insufficient Process Validation,Disinformation,Media,"Montreal, CA",,,,,,,,,
-2011-222,WHID 2011-222: MetService website hacked during busiest week,"Visitors to the MetService website this week may have been exposed to a computer virus, after its ad server was hacked.",http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=10745663,8/17/2011,Malvertising,Insufficient Process Validation,Planting of Malware,Media,New Zealand,,,,,,,,,
-2011-222,WHID 2011-222: MetService website hacked during busiest week,"Visitors to the MetService website this week may have been exposed to a computer virus, after its ad server was hacked.",http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=10745663,8/17/2011,Malvertising,Insufficient Process Validation,Planting of Malware,Media,New Zealand,,,,,,,,,
-2011-223,WHID 2011-223: Anonymous AntiSec Breaches Defense Contractor Vanguard Network,"The attack seems to have exploited vulnerabilities in the popular WordPress blogging platform. VDI apparently had not upgraded two out-dated plug-ins, leaving security holes wide open for the cyber-attackers to waltz through.",http://www.eweek.com/c/a/Security/Anonymous-AntiSec-Breaches-Defense-Contractor-Vanguard-Network-502551/,8/18/2011,Unknown,Unknown,Leakage of Information,Technology,"Houston, TX",,,,,,,,,
-2011-223,WHID 2011-223: Anonymous AntiSec Breaches Defense Contractor Vanguard Network,"The attack seems to have exploited vulnerabilities in the popular WordPress blogging platform. VDI apparently had not upgraded two out-dated plug-ins, leaving security holes wide open for the cyber-attackers to waltz through.",http://www.eweek.com/c/a/Security/Anonymous-AntiSec-Breaches-Defense-Contractor-Vanguard-Network-502551/,8/18/2011,Unknown,Unknown,Leakage of Information,Technology,"Houston, TX",,,,,,,,,
-2011-224,WHID 2011-224: Foreign bank???s net banking attacked by hacker,"The internet banking service of HSBC Korea was temporarily shut down on Saturday after its official Web site was attacked by hackers, HSBC Korea said.",http://joongangdaily.joins.com/article/view.asp?aid=2940509,8/22/2011,Unknown,Improper Output Handling,Defacement,Finance,"Central District, HK",,,,,,,,,
-2011-224,WHID 2011-224: Foreign bank???s net banking attacked by hacker,"The internet banking service of HSBC Korea was temporarily shut down on Saturday after its official Web site was attacked by hackers, HSBC Korea said.",http://joongangdaily.joins.com/article/view.asp?aid=2940509,8/22/2011,Unknown,Improper Output Handling,Defacement,Finance,"Central District, HK",,,,,,,,,
-2011-225,WHID 2011-225: Hackers deface Libya's top level domain registry with anti-Gadaffi message,"Hackers calling themselves ""Electr0n"" have defaced the nic.ly website, the main registry which administers .ly domain names (the "".ly"" stands for ""Libya"") and replaced it with a defiant message",http://nakedsecurity.sophos.com/2011/08/22/hackers-deface-libya-anti-gadaffi/,8/22/2011,Unknown,Unknown,Defacement,Hosting Providers,"Tripoli, LY",,,,,,,,,
-2011-225,WHID 2011-225: Hackers deface Libya's top level domain registry with anti-Gadaffi message,"Hackers calling themselves ""Electr0n"" have defaced the nic.ly website, the main registry which administers .ly domain names (the "".ly"" stands for ""Libya"") and replaced it with a defiant message",http://nakedsecurity.sophos.com/2011/08/22/hackers-deface-libya-anti-gadaffi/,8/22/2011,Unknown,Unknown,Defacement,Hosting Providers,"Tripoli, LY",,,,,,,,,
-2011-226,WHID 2011-226: Nokia Developer forum hacked,"A hacker who goes by the name of mrNRG recently broke into the Nokia Developer forum, and defaced it by redirecting anyone who visited it to another page",http://www.ubergizmo.com/2011/08/nokia-developer-forum-hacked/,8/22/2011,Unknown,Improper Output Handling,Defacement,Technology,"Cambridge, MA",,,,,,,,,
-2011-226,WHID 2011-226: Nokia Developer forum hacked,"A hacker who goes by the name of mrNRG recently broke into the Nokia Developer forum, and defaced it by redirecting anyone who visited it to another page",http://www.ubergizmo.com/2011/08/nokia-developer-forum-hacked/,8/22/2011,Unknown,Improper Output Handling,Defacement,Technology,"Cambridge, MA",,,,,,,,,
-2011-227,WHID 2011-227: South Korean Domain Registrar Gabia Hacked,"Gabia (www.gabia.com), a South Korean domain registrar was hacked on Saturday, affecting the online connection with 100,000 registered domains, according to a report Monday by the Korea Herald.",http://www.thewhir.com/web-hosting-news/082411_South_Korean_Domain_Registrar_Gabia_Epson_Korea_Websites_Hacked,8/24/2011,Unknown,Unknown,Downtime,Hosting Providers,South Korea,,,,,,,,,
-2011-227,WHID 2011-227: South Korean Domain Registrar Gabia Hacked,"Gabia (www.gabia.com), a South Korean domain registrar was hacked on Saturday, affecting the online connection with 100,000 registered domains, according to a report Monday by the Korea Herald.",http://www.thewhir.com/web-hosting-news/082411_South_Korean_Domain_Registrar_Gabia_Epson_Korea_Websites_Hacked,8/24/2011,Unknown,Unknown,Downtime,Hosting Providers,South Korea,,,,,,,,,
-2011-228,WHID 2011-228: Epson Korea Website Hacked,"A report by ZDNet says the HSBC Korea website was also hacked, as was the Epson Korea website where 350,000 users information was leaked, prompting the company to urge customers to change their passwords.",http://www.thewhir.com/web-hosting-news/082411_South_Korean_Domain_Registrar_Gabia_Epson_Korea_Websites_Hacked,8/24/2011,Unknown,Unknown,Leakage of Information,Retail,"Seoul, KR",,,,,,,,,
-2011-228,WHID 2011-228: Epson Korea Website Hacked,"A report by ZDNet says the HSBC Korea website was also hacked, as was the Epson Korea website where 350,000 users information was leaked, prompting the company to urge customers to change their passwords.",http://www.thewhir.com/web-hosting-news/082411_South_Korean_Domain_Registrar_Gabia_Epson_Korea_Websites_Hacked,8/24/2011,Unknown,Unknown,Leakage of Information,Retail,"Seoul, KR",,,,,,,,,
-2011-229,WHID 2011-229: Yale Social Security Numbers Exposed In Latest Case Of 'Google Hacking',"A recent data breach at Yale University marks the latest example of a security flaw exposed by ""Google hacking,"" which involves querying the popular search engine for website vulnerabilities.",http://www.huffingtonpost.com/2011/08/24/yale-social-security-numbers-google-hacking_n_935400.html,8/24/2011,Abuse of Functionality,Insecure Indexing,Leakage of Information,Education,"New Haven, CT",,,,,,,,,
-2011-229,WHID 2011-229: Yale Social Security Numbers Exposed In Latest Case Of 'Google Hacking',"A recent data breach at Yale University marks the latest example of a security flaw exposed by ""Google hacking,"" which involves querying the popular search engine for website vulnerabilities.",http://www.huffingtonpost.com/2011/08/24/yale-social-security-numbers-google-hacking_n_935400.html,8/24/2011,Abuse of Functionality,Insecure Indexing,Leakage of Information,Education,"New Haven, CT",,,,,,,,,
-2011-22,WHID 2011-22: Zuckerberg's Facebook page hacked,"Mark Zuckerberg's Facebook page was hacked on Tuesday to promote an alternative business plan for the social network site.
-2011-230,WHID 2011-230: Botnet attacks pizza delivery service,"One of the most prominent victims is pizza.de. During one attack, the company registered attacks from approximately 50,000 IP addresses generating 20,000 ??? 30,000 requests per second over the course of three hours.",http://www.pcworld.com/businesscenter/article/239501/turkish_hackers_strike_websites_with_dns_hack.html,8/25/2011,Denial of Service,Insufficient Anti-automation,Downtime,Retail,Germany,,,,,,,,,
-2011-230,WHID 2011-230: Botnet attacks pizza delivery service,"One of the most prominent victims is pizza.de. During one attack, the company registered attacks from approximately 50,000 IP addresses generating 20,000 ??? 30,000 requests per second over the course of three hours.",http://www.pcworld.com/businesscenter/article/239501/turkish_hackers_strike_websites_with_dns_hack.html,8/25/2011,Denial of Service,Insufficient Anti-automation,Downtime,Retail,Germany,,,,,,,,,
-2011-231,WHID 2011-231: Firm at heart of biggest oil spill spews toxic web attack,"Researchers at web security firm Websense said deepwater.com, Transocean's official website, has been hosting malicious exploit code that attempts to install malware on the machines of people who visit the site.",http://www.theregister.co.uk/2011/08/25/transocean_website_compromise/,8/25/2011,Unknown,Improper Output Handling,Planting of Malware,Energy,"Jersey City, NJ",,,,,,,,,
-2011-231,WHID 2011-231: Firm at heart of biggest oil spill spews toxic web attack,"Researchers at web security firm Websense said deepwater.com, Transocean's official website, has been hosting malicious exploit code that attempts to install malware on the machines of people who visit the site.",http://www.theregister.co.uk/2011/08/25/transocean_website_compromise/,8/25/2011,Unknown,Improper Output Handling,Planting of Malware,Energy,"Jersey City, NJ",,,,,,,,,
-2011-232,WHID 2011-232: Ron Paul's Fundraising Drive Disrupted by DDoS Attack,A fundraising drive organized by Texas Congressman Ron Paul was disrupted because his campaign website became the target of a distributed denial-of-service (DDoS) attack.,http://news.softpedia.com/news/Ron-Paul-s-Fundraising-Drive-Disrupted-by-DDoS-Attack-218265.shtml,8/23/2011,Denial of Service,Insufficient Anti-automation,Monetary Loss,Politics,"San Antonio, TX",,,,,,,,,
-2011-232,WHID 2011-232: Ron Paul's Fundraising Drive Disrupted by DDoS Attack,A fundraising drive organized by Texas Congressman Ron Paul was disrupted because his campaign website became the target of a distributed denial-of-service (DDoS) attack.,http://news.softpedia.com/news/Ron-Paul-s-Fundraising-Drive-Disrupted-by-DDoS-Attack-218265.shtml,8/23/2011,Denial of Service,Insufficient Anti-automation,Monetary Loss,Politics,"San Antonio, TX",,,,,,,,,
-2011-233,WHID 2011-233: Nokia developer forums hacked: 'Significant number' of records stolen,"In a statement on the Nokia community pages, which have since been closed amid the hack, the phone giant warns that members??? personal information, including dates of birth and email addresses, may have been stolen. The statement details how database tables containing the personal information were accessed by exploiting a vulnerability in the bulletin board software, through means of ???an SQL injection attack???.",http://www.zdnet.com/blog/btl/nokia-developer-forums-hacked-significant-number-of-records-stolen/56456,8/29/2011,SQL Injection,Improper Input Handling,Leakage of Information,Technology,"Cambridge, MA",,,,,,,,,
-2011-233,WHID 2011-233: Nokia developer forums hacked: 'Significant number' of records stolen,"In a statement on the Nokia community pages, which have since been closed amid the hack, the phone giant warns that members??? personal information, including dates of birth and email addresses, may have been stolen. The statement details how database tables containing the personal information were accessed by exploiting a vulnerability in the bulletin board software, through means of ???an SQL injection attack???.",http://www.zdnet.com/blog/btl/nokia-developer-forums-hacked-significant-number-of-records-stolen/56456,8/29/2011,SQL Injection,Improper Input Handling,Leakage of Information,Technology,"Cambridge, MA",,,,,,,,,
-2011-234,WHID 2011-234: DDoS Attack Sends Wikileaks.org Website Down,"The famed whistle blowing organisation Wikileaks has admitted that its website, Wikileaks.org, had suffered at the hands of an organised Distributed Denial of Service (DDoS) attack.",http://www.webhostdir.com/news/ShowItem.aspx?ID=90625,8/31/2011,Denial of Service,Insufficient Anti-automation,Downtime,News,"San Mateo, CA",,,,,,,,,
-2011-234,WHID 2011-234: DDoS Attack Sends Wikileaks.org Website Down,"The famed whistle blowing organisation Wikileaks has admitted that its website, Wikileaks.org, had suffered at the hands of an organised Distributed Denial of Service (DDoS) attack.",http://www.webhostdir.com/news/ShowItem.aspx?ID=90625,8/31/2011,Denial of Service,Insufficient Anti-automation,Downtime,News,"San Mateo, CA",,,,,,,,,
-2011-235,WHID 2011-235: Xbox 360 Accounts Being Hacked,"There have been a lot of reports over the past day of Xbox 360 accounts being hacked and user accounts being locked. The common ground is an Xbox account and Windows Live ID, with users reporting fraudulent charges on their accounts.",http://www.evdoinfo.com/content/view/3711/64/,8/31/2011,Brute Force,Insufficient Anti-automation,Account Takeover,Entertainment,"Redmond, WA",,,,,,,,,
-2011-235,WHID 2011-235: Xbox 360 Accounts Being Hacked,"There have been a lot of reports over the past day of Xbox 360 accounts being hacked and user accounts being locked. The common ground is an Xbox account and Windows Live ID, with users reporting fraudulent charges on their accounts.",http://www.evdoinfo.com/content/view/3711/64/,8/31/2011,Brute Force,Insufficient Anti-automation,Account Takeover,Entertainment,"Redmond, WA",,,,,,,,,
-2011-236,WHID 2011-236: Hollywood is being hacked by Anonymous offshoot,"Another hacking group hits the scene. This time they're not even attempting a message or purpose. A new faction that claims to be an offshoot of Anonymous named Hollywood Leaks has targeted celebrity emails and Twitter accounts. According Chen the group isn't particularly tech savvy, ""they say they've broken into accounts mostly by guessing bad security questions.""",http://www.cbsnews.com/8301-501465_162-20100452-501465.html,9/1/2011,Credential/Session Prediction,Insufficient Password Recovery,Leakage of Information,Entertainment,,,,,,,,,,
-2011-236,WHID 2011-236: Hollywood is being hacked by Anonymous offshoot,"Another hacking group hits the scene. This time they're not even attempting a message or purpose. A new faction that claims to be an offshoot of Anonymous named Hollywood Leaks has targeted celebrity emails and Twitter accounts. According Chen the group isn't particularly tech savvy, ""they say they've broken into accounts mostly by guessing bad security questions.""",http://www.cbsnews.com/8301-501465_162-20100452-501465.html,9/1/2011,Credential/Session Prediction,Insufficient Password Recovery,Leakage of Information,Entertainment,,,,,,,,,,
-2011-237,WHID 2011-237: Turkish Hackers Strike Websites With DNS Hack,"Turkguvenligi managed to hack NetName's DNS servers through a SQL injection attack, which involves putting commands into a web-based form to see if the back-end database responds. If those commands aren't scanned for malicious code, an attacker could gain access to the system. In the case of NetNames, Turkguvenligi put a redelegation order into the company's system and changed the address of the master DNS servers that served data for the websites, according to a statement from NetNames.",http://www.pcworld.com/businesscenter/article/239501/turkish_hackers_strike_websites_with_dns_hack.html,4/21/2011,SQL Injection,Improper Input Handling,Defacement,Retail,,Yes,,,,,,,,
-2011-237,WHID 2011-237: Turkish Hackers Strike Websites With DNS Hack,"Turkguvenligi managed to hack NetName's DNS servers through a SQL injection attack, which involves putting commands into a web-based form to see if the back-end database responds. If those commands aren't scanned for malicious code, an attacker could gain access to the system. In the case of NetNames, Turkguvenligi put a redelegation order into the company's system and changed the address of the master DNS servers that served data for the websites, according to a statement from NetNames.",http://www.pcworld.com/businesscenter/article/239501/turkish_hackers_strike_websites_with_dns_hack.html,4/21/2011,SQL Injection,Improper Input Handling,Defacement,Retail,,Yes,,,,,,,,
-2011-238,"WHID 2011-238: US uni warned, then hacked",A frustrated hacker has defaced the web site of the University of Vermont after multiple cross site scripting (XSS) vulnerability disclosures allegedly went ignored. The hacker Codeine said the university was advised of XSS holes exactly one month ago but failed to patch the holes despite allegedly claiming to be doing so soon after the disclosure. The disclosure was posted on PacketStorm.org.,"http://www.scmagazine.com.au/News/271391,us-uni-warned-then-hacked.aspx",9/8/2011,SQL Injection,Improper Input Handling,Defacement,Education,"San Francisco, CA",,,,,,,,,
-2011-238,"WHID 2011-238: US uni warned, then hacked",A frustrated hacker has defaced the web site of the University of Vermont after multiple cross site scripting (XSS) vulnerability disclosures allegedly went ignored. The hacker Codeine said the university was advised of XSS holes exactly one month ago but failed to patch the holes despite allegedly claiming to be doing so soon after the disclosure. The disclosure was posted on PacketStorm.org.,"http://www.scmagazine.com.au/News/271391,us-uni-warned-then-hacked.aspx",9/8/2011,SQL Injection,Improper Input Handling,Defacement,Education,"San Francisco, CA",,,,,,,,,
-2011-239,"WHID 2011-239: NBC Twitter account hacked, issued false reports","The NBC News Twitter account, @NBCNews, was hacked late Friday, resulting in false reports about an airplane attack at Ground Zero, the Manhattan site of the original 9/11 attacks. The Twitter account was quickly taken offline, and has since been restored, with the false tweets removed.",http://technolog.msnbc.msn.com/_news/2011/09/09/7692776-nbc-twitter-account-hacked-issued-false-reports,9/9/2011,Unknown,Unknown,Disinformation,Web 2.0,,,,,,,,,,
-2011-239,"WHID 2011-239: NBC Twitter account hacked, issued false reports","The NBC News Twitter account, @NBCNews, was hacked late Friday, resulting in false reports about an airplane attack at Ground Zero, the Manhattan site of the original 9/11 attacks. The Twitter account was quickly taken offline, and has since been restored, with the false tweets removed.",http://technolog.msnbc.msn.com/_news/2011/09/09/7692776-nbc-twitter-account-hacked-issued-false-reports,9/9/2011,Unknown,Unknown,Disinformation,Web 2.0,,,,,,,,,,
-2011-23,WHID 2011-23: Anonymous attacks websites in Egypt,"Following the recent uprising in Tunisia, thousands of demonstrators took to the streets in Egypt yesterday to demand an end to President Hosni Mubarak's rule. The online collective known as Anonymous has joined in the protests by orchestrating distributed denial of service attacks against key Egyptian websites.",http://news.netcraft.com/archives/2011/01/26/anonymous-attacks-websites-in-egypt.html,1/26/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,Egypt,Yes,Operation: Egypt,,,,,,,
-2011-23,WHID 2011-23: Anonymous attacks websites in Egypt,"Following the recent uprising in Tunisia, thousands of demonstrators took to the streets in Egypt yesterday to demand an end to President Hosni Mubarak's rule. The online collective known as Anonymous has joined in the protests by orchestrating distributed denial of service attacks against key Egyptian websites.",http://news.netcraft.com/archives/2011/01/26/anonymous-attacks-websites-in-egypt.html,1/26/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,Egypt,Yes,Operation: Egypt,,,,,,,
-2011-240,WHID 2011-240: Russia's embassy in UK says hackers hit website,Russia's embassy in London said on Sunday its website crashed in a suspected hacking attack just before Prime Minister David Cameron begins the first visit by a British leader to Moscow since the 2006 killing in London of a Kremlin critic.,http://www.reuters.com/article/2011/09/11/us-russia-britain-website-idUSTRE78A1P620110911,9/11/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Plano, TX",,,,,,,,,
-2011-240,WHID 2011-240: Russia's embassy in UK says hackers hit website,Russia's embassy in London said on Sunday its website crashed in a suspected hacking attack just before Prime Minister David Cameron begins the first visit by a British leader to Moscow since the 2006 killing in London of a Kremlin critic.,http://www.reuters.com/article/2011/09/11/us-russia-britain-website-idUSTRE78A1P620110911,9/11/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Plano, TX",,,,,,,,,
-2011-241,WHID 2011-241: BitCoin forum hacked by donor,"A hacker has used a zero day flaw to steal email addresses, hashed passwords and read personal messages from the bitcointalk.org forum.","http://www.scmagazine.com.au/News/271688,bitcoin-forum-hacked-by-donor.aspx",9/12/2011,SQL Injection,Improper Input Handling,Leakage of Information,User Forum,"Dallas, TX",,,,,,,,,
-2011-241,WHID 2011-241: BitCoin forum hacked by donor,"A hacker has used a zero day flaw to steal email addresses, hashed passwords and read personal messages from the bitcointalk.org forum.","http://www.scmagazine.com.au/News/271688,bitcoin-forum-hacked-by-donor.aspx",9/12/2011,SQL Injection,Improper Input Handling,Leakage of Information,User Forum,"Dallas, TX",,,,,,,,,
-2011-242,WHID 2011-242: Armenians hack website of US-based Karabakh Foundation,The website of the Foundation was fully destroyed as a result of DDOS attack. An initial investigation revealed that the hacker attack has been committed from Armenia. The website was restored in short.,http://www.news.az/articles/tech/44625,9/16/2011,Denial of Service,Insufficient Anti-automation,Downtime,Politics,"Absecon, US",,,,Armenia,,,,,
-2011-242,WHID 2011-242: Armenians hack website of US-based Karabakh Foundation,The website of the Foundation was fully destroyed as a result of DDOS attack. An initial investigation revealed that the hacker attack has been committed from Armenia. The website was restored in short.,http://www.news.az/articles/tech/44625,9/16/2011,Denial of Service,Insufficient Anti-automation,Downtime,Politics,"Absecon, US",,,,Armenia,,,,,
-2011-243,WHID 2011-243: Spanish feds mend website clobbered by Anonymous,Spanish national police have reactivated their website following attacks by hacking supergroup Anonymous. The assault on policia.es on Thursday coincided with the publication of the names of 30 bodyguards working for Spanish prime minister Jose Rodriguez Zapatero.,http://www.theregister.co.uk/2011/09/16/spain_police_hacktivism_attack/,9/16/2011,Denial of Service,Insufficient Anti-automation,Downtime,Law Enforcement,Spain,,,,,,,,,
-2011-243,WHID 2011-243: Spanish feds mend website clobbered by Anonymous,Spanish national police have reactivated their website following attacks by hacking supergroup Anonymous. The assault on policia.es on Thursday coincided with the publication of the names of 30 bodyguards working for Spanish prime minister Jose Rodriguez Zapatero.,http://www.theregister.co.uk/2011/09/16/spain_police_hacktivism_attack/,9/16/2011,Denial of Service,Insufficient Anti-automation,Downtime,Law Enforcement,Spain,,,,,,,,,
-2011-244,WHID 2011-244: Anonymous group hacks Mexican government websites under operation OpIndependencia,"Hacker group Anonymous after having created havoc throughout the cyber space in recent times, has once again got activated with the hacking of government sites in Mexico, reports Reuters.",http://socialbarrel.com/anonymous-group-hacks-mexican-government-websites-under-operation-opindependencia/20602/,9/16/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Mexico, MX",,,,,,,,,
-2011-244,WHID 2011-244: Anonymous group hacks Mexican government websites under operation OpIndependencia,"Hacker group Anonymous after having created havoc throughout the cyber space in recent times, has once again got activated with the hacking of government sites in Mexico, reports Reuters.",http://socialbarrel.com/anonymous-group-hacks-mexican-government-websites-under-operation-opindependencia/20602/,9/16/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Mexico, MX",,,,,,,,,
-2011-245,"WHID 2011-245: Hacker ""soldier"" steals $3.2 million from U.S. companies","A hacker known in the cybercriminal underground as ???soldier??? has stolen $3.2 million from major U.S. corporations in the past six months, according to researchers at anti-virus firm Trend Micro. The attacker, believed to be in his early 20s and residing in Russia, used various toolkits, such as SpyEye and Zeus, to plunder millions of dollars from corporate bank accounts since January, Jamz Yaneza, threat research manager at Trend Micro, told SCMagazineUS.com on Thursday",http://www.scmagazineus.com/hacker-soldier-steals-32-million-from-us-companies/article/212070/,9/15/2011,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,,Yes,,,,,,,,
-2011-245,"WHID 2011-245: Hacker ""soldier"" steals $3.2 million from U.S. companies","A hacker known in the cybercriminal underground as ???soldier??? has stolen $3.2 million from major U.S. corporations in the past six months, according to researchers at anti-virus firm Trend Micro. The attacker, believed to be in his early 20s and residing in Russia, used various toolkits, such as SpyEye and Zeus, to plunder millions of dollars from corporate bank accounts since January, Jamz Yaneza, threat research manager at Trend Micro, told SCMagazineUS.com on Thursday",http://www.scmagazineus.com/hacker-soldier-steals-32-million-from-us-companies/article/212070/,9/15/2011,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,,Yes,,,,,,,,
-2011-246,"WHID 2011-246: Hundreds of Go Daddy sites hacked, redirected to malware",It was reported today that hundreds of the company???s sites were compromised. Visitors coming to those sites from search engines were redirected to a page containing malware.,http://www.myce.com/news/hundreds-of-go-daddy-sites-hacked-redirected-to-malware-51876/,9/17/2011,Malware,Insufficient Authentication,Planting of Malware,Hosting Providers,,Yes,,,,,,,,
-2011-246,"WHID 2011-246: Hundreds of Go Daddy sites hacked, redirected to malware",It was reported today that hundreds of the company???s sites were compromised. Visitors coming to those sites from search engines were redirected to a page containing malware.,http://www.myce.com/news/hundreds-of-go-daddy-sites-hacked-redirected-to-malware-51876/,9/17/2011,Malware,Insufficient Authentication,Planting of Malware,Hosting Providers,,Yes,,,,,,,,
-2011-247,WHID 2011-247: Japan govt websites hit by cyberattacks,"Websites of some Japanese government agencies were hit by cyberattacks over the weekend, temporarily blocking access to them, Kyodo news agency reported Monday, citing national police.",http://www.google.com/hostednews/afp/article/ALeqM5iR92sOHnpWdW86haDoaKWwijvpnA?docId=CNG.12aaa9e587061958aecf129b4e395403.21,9/19/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,Japan,,,,,,,,,
-2011-247,WHID 2011-247: Japan govt websites hit by cyberattacks,"Websites of some Japanese government agencies were hit by cyberattacks over the weekend, temporarily blocking access to them, Kyodo news agency reported Monday, citing national police.",http://www.google.com/hostednews/afp/article/ALeqM5iR92sOHnpWdW86haDoaKWwijvpnA?docId=CNG.12aaa9e587061958aecf129b4e395403.21,9/19/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,Japan,,,,,,,,,
-2011-248,"WHID 2011-248: uTorrent.com hacked, serving scareware","The popular file sharing web sites were compromised for a brief period of a few hours, with the links to the BitTorrent client replaced by a scareware (Security Shield) download.",http://www.zdnet.com/blog/security/utorrentcom-hacked-serving-scareware/9413,9/19/2011,Unknown,Improper Output Handling,Planting of Malware,File Sharing,"Santa Ana, CA",,,,,,,,,
-2011-248,"WHID 2011-248: uTorrent.com hacked, serving scareware","The popular file sharing web sites were compromised for a brief period of a few hours, with the links to the BitTorrent client replaced by a scareware (Security Shield) download.",http://www.zdnet.com/blog/security/utorrentcom-hacked-serving-scareware/9413,9/19/2011,Unknown,Improper Output Handling,Planting of Malware,File Sharing,"Santa Ana, CA",,,,,,,,,
-2011-249,WHID 2011-249: Jonesboro Police investigate hacking of library bank accounts,"Computer hackers have left the Jonesboro Public Library high and dry after stealing over $37,000",http://www.kait8.com/story/15513612/jonesboro-police-investigate-hacking-of-library-bank-accounts,9/22/2011,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,"Jonesboro, AR",,,,,,,,,
-2011-249,WHID 2011-249: Jonesboro Police investigate hacking of library bank accounts,"Computer hackers have left the Jonesboro Public Library high and dry after stealing over $37,000",http://www.kait8.com/story/15513612/jonesboro-police-investigate-hacking-of-library-bank-accounts,9/22/2011,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,"Jonesboro, AR",,,,,,,,,
-2011-24,"WHID 2011-24: Twitter worm hits goo.gl, redirects to fake anti-virus","A fast-moving Twitter worm is in circulation, using Google???s goo.gl redirection service to push unsuspecting users to a notorious scareware (fake anti-virus) malware campaign.",http://www.zdnet.com/blog/security/twitter-worm-hits-googl-redirects-to-fake-anti-virus/7938,1/20/2011,Unknown,Unknown,Planting of Malware,Web 2.0,,No,,,,Twitter,,,,
-2011-24,"WHID 2011-24: Twitter worm hits goo.gl, redirects to fake anti-virus","A fast-moving Twitter worm is in circulation, using Google???s goo.gl redirection service to push unsuspecting users to a notorious scareware (fake anti-virus) malware campaign.",http://www.zdnet.com/blog/security/twitter-worm-hits-googl-redirects-to-fake-anti-virus/7938,1/20/2011,Unknown,Unknown,Planting of Malware,Web 2.0,,No,,,,Twitter,,,,
-2011-250,WHID 2011-250: NetRegistry suffers DDoS attack,Australian web host NetRegistry has been hit with a continuing Distributed Denial of Service (DDoS) attack leaving many customers unable to access their websites or virtual private servers (VPS) over the course of the day.,http://itechreport.com.au/2011/09/26/netregistry-suffers-ddos-attack/,9/26/2011,Denial of Service,Insufficient Anti-automation,Downtime,Hosting Providers,Australia,,,,,,,,,
-2011-250,WHID 2011-250: NetRegistry suffers DDoS attack,Australian web host NetRegistry has been hit with a continuing Distributed Denial of Service (DDoS) attack leaving many customers unable to access their websites or virtual private servers (VPS) over the course of the day.,http://itechreport.com.au/2011/09/26/netregistry-suffers-ddos-attack/,9/26/2011,Denial of Service,Insufficient Anti-automation,Downtime,Hosting Providers,Australia,,,,,,,,,
-2011-251,WHID 2011-251: MySQL.com Hacked to Serve Malware,The website for the open-source MySQL database was hacked and used to serve malware to visitors Monday.,http://www.pcworld.com/businesscenter/article/240609/mysqlcom_hacked_to_serve_malware.html,9/26/2011,Unknown,Improper Output Handling,Planting of Malware,Technology,Sweden,,,,,,,,,
-2011-251,WHID 2011-251: MySQL.com Hacked to Serve Malware,The website for the open-source MySQL database was hacked and used to serve malware to visitors Monday.,http://www.pcworld.com/businesscenter/article/240609/mysqlcom_hacked_to_serve_malware.html,9/26/2011,Unknown,Improper Output Handling,Planting of Malware,Technology,Sweden,,,,,,,,,
-2011-252,WHID 2011-252: Hacker group briefly hits USA Today's Twitter page,Hacker group The Script Kiddies successfully hacked another news organization when it logged onto USA Today's Twitter page and posted false statements Sunday evening. USA Today promptly removed the messages and posted a statement about the hack.,http://www.cnn.com/2011/09/26/us/usa-today-twitter-hack/,9/27/2011,Unknown,Unknown,Disinformation,Web 2.0,,,,,,,,,,
-2011-252,WHID 2011-252: Hacker group briefly hits USA Today's Twitter page,Hacker group The Script Kiddies successfully hacked another news organization when it logged onto USA Today's Twitter page and posted false statements Sunday evening. USA Today promptly removed the messages and posted a statement about the hack.,http://www.cnn.com/2011/09/26/us/usa-today-twitter-hack/,9/27/2011,Unknown,Unknown,Disinformation,Web 2.0,,,,,,,,,,
-2011-253,WHID 2011-253: Thousands of sites compromised following hosting provider hack,"California-based hosting provider InMotion has suffered a compromise that resulted in the defacement of thousands of home pages of websites hosted on their infrastructure, which were allegedly set to serve malware.",http://www.net-security.org/secworld.php?id=11703,9/28/2011,Unknown,Improper Output Handling,Planting of Malware,Hosting Providers,"Santa Monica, CA",Yes,,,,,,,,
-2011-253,WHID 2011-253: Thousands of sites compromised following hosting provider hack,"California-based hosting provider InMotion has suffered a compromise that resulted in the defacement of thousands of home pages of websites hosted on their infrastructure, which were allegedly set to serve malware.",http://www.net-security.org/secworld.php?id=11703,9/28/2011,Unknown,Improper Output Handling,Planting of Malware,Hosting Providers,"Santa Monica, CA",Yes,,,,,,,,
-2011-254,WHID 2011-254: Computer hackers stole ??44million by discovering bank Pins,The international group used a virus called Zeus to access Pins for bank accounts in Europe and the US. The money was then transferred to other accounts and withdrawn from cash machines.,http://www.metro.co.uk/news/877460-computer-hackers-stole-44million-by-discovering-bank-pins,10/3/2011,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,,,,,,,,,,
-2011-254,WHID 2011-254: Computer hackers stole ??44million by discovering bank Pins,The international group used a virus called Zeus to access Pins for bank accounts in Europe and the US. The money was then transferred to other accounts and withdrawn from cash machines.,http://www.metro.co.uk/news/877460-computer-hackers-stole-44million-by-discovering-bank-pins,10/3/2011,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,,,,,,,,,,
-2011-255,"WHID 2011-255:Unijobs.com.au website hacked, more than 600 passwords exposed",Citigroup acknowledged on Thursday that unidentified hackers had breached its security and gained access to the data of hundreds of thousands of its bank card customers.,http://news.com.com/2100-1017-245372.html?legacy=cnet,10/7/2011,SQL Injection,Improper Input Handling,Leakage of Information,,Australia,No,,,,,,600,,
-2011-255,"WHID 2011-255:Unijobs.com.au website hacked, more than 600 passwords exposed",Citigroup acknowledged on Thursday that unidentified hackers had breached its security and gained access to the data of hundreds of thousands of its bank card customers.,http://news.com.com/2100-1017-245372.html?legacy=cnet,10/7/2011,SQL Injection,Improper Input Handling,Leakage of Information,,Australia,No,,,,,,600,,
-2011-256,"WHID 2011-256: Sony Detects Suspicious Behavior, Locks 93,000 Online Accounts","Sony locked the accounts of some 93,000 individuals on the Playstation Network (PSN), the Sony Entertainment Network (SEN), and Sony Online Entertainment (SOE) services following a mass log-in attempt using username-password combinations obtained from an unnamed source.",http://threatpost.com/en_us/blogs/sony-detects-suspicious-behavior-locks-93000-online-accounts-101211,10/12/2011,Brute Force,Insufficient Anti-automation,Account Takeover,Entertainment,"Tokyo, Japan",yes,,,,,,,,
-2011-256,"WHID 2011-256: Sony Detects Suspicious Behavior, Locks 93,000 Online Accounts","Sony locked the accounts of some 93,000 individuals on the Playstation Network (PSN), the Sony Entertainment Network (SEN), and Sony Online Entertainment (SOE) services following a mass log-in attempt using username-password combinations obtained from an unnamed source.",http://threatpost.com/en_us/blogs/sony-detects-suspicious-behavior-locks-93000-online-accounts-101211,10/12/2011,Brute Force,Insufficient Anti-automation,Account Takeover,Entertainment,"Tokyo, Japan",yes,,,,,,,,
-2011-257,"WHID 2011-257: WineHQ database hacked, passwords stolen",Malicious hackers exploit vulnerabilities in phpmyadmin to gain access to WineHQ???s database. Usernames and passwords were stolen.,http://www.zdnet.com/blog/security/winehq-database-hacked-passwords-stolen/9604,10/12/2011,Unknown,Unknown,Leakage of Information,Technology,"Saint Paul, MN",,,,,phpmyadmin,,,,
-2011-257,"WHID 2011-257: WineHQ database hacked, passwords stolen",Malicious hackers exploit vulnerabilities in phpmyadmin to gain access to WineHQ???s database. Usernames and passwords were stolen.,http://www.zdnet.com/blog/security/winehq-database-hacked-passwords-stolen/9604,10/12/2011,Unknown,Unknown,Leakage of Information,Technology,"Saint Paul, MN",,,,,phpmyadmin,,,,
-2011-258,WHID 2011-258: Mass ASP.NET attack causes websites to turn on visitors,"An infection that causes poorly configured websites to silently bombard visitors with malware attacks has hit almost 614,000 webpages, Google searches show.",http://www.theregister.co.uk/2011/10/14/mass_website_inection_grows/,10/14/2011,SQL Injection,Improper Input Handling,Planting of Malware,,United Kingdom,Yes,,,,,,,,
-2011-258,WHID 2011-258: Mass ASP.NET attack causes websites to turn on visitors,"An infection that causes poorly configured websites to silently bombard visitors with malware attacks has hit almost 614,000 webpages, Google searches show.",http://www.theregister.co.uk/2011/10/14/mass_website_inection_grows/,10/14/2011,SQL Injection,Improper Input Handling,Planting of Malware,,United Kingdom,Yes,,,,,,,,
-2011-259,WHID 2011-259: 4Chan Hackers Attack Yakoozo.com,UK based hotel search engine Yakoozo.com ground to a halt recently after being subject to a major cyber-attack by users of the notorious image posting website 4chan.,http://www.webwire.com/ViewPressRel.asp?aId=147869,12/10/2010,SQL Injection,Improper Input Handling,Defacement,Search Engine,England,,,,,,,,,
-2011-259,WHID 2011-259: 4Chan Hackers Attack Yakoozo.com,UK based hotel search engine Yakoozo.com ground to a halt recently after being subject to a major cyber-attack by users of the notorious image posting website 4chan.,http://www.webwire.com/ViewPressRel.asp?aId=147869,12/10/2010,SQL Injection,Improper Input Handling,Defacement,Search Engine,England,,,,,,,,,
-2011-25,WHID 2011-25: Mail & Guardian website taken down after hacker attack,"The Mail & Guardian Online, one of South Africa???s oldest news website, has been taken offline.
-2011-260,"WHID 2011-260: Boston police website hacked, user info posted online","A Boston Police Department website was hacked. At least 2,000 names and passwords have been posted online.",http://www.msnbc.msn.com/id/45001308/ns/local_news-boston_ma/#.TqV6OXEzLdo,10/22/2011,Unknown,Unknown,Leakage of Information,Law Enforcement,"Boston, Massachusettes",,,,,,,,,
-2011-260,"WHID 2011-260: Boston police website hacked, user info posted online","A Boston Police Department website was hacked. At least 2,000 names and passwords have been posted online.",http://www.msnbc.msn.com/id/45001308/ns/local_news-boston_ma/#.TqV6OXEzLdo,10/22/2011,Unknown,Unknown,Leakage of Information,Law Enforcement,"Boston, Massachusettes",,,,,,,,,
-2011-261,WHID 2011-261: Hackers mistake French rugby site for German stock exchange,"Hacktivists mistakenly attacked a French rugby fansite instead of their intended target, the German stock exchange.",http://www.theregister.co.uk/2011/11/04/french_rugby_site_hacktivist_maul/,11/4/2011,Denial of Service,Insufficient Anti-automation,Downtime,Sports,France,,,1,Germany,,,,,
-2011-261,WHID 2011-261: Hackers mistake French rugby site for German stock exchange,"Hacktivists mistakenly attacked a French rugby fansite instead of their intended target, the German stock exchange.",http://www.theregister.co.uk/2011/11/04/french_rugby_site_hacktivist_maul/,11/4/2011,Denial of Service,Insufficient Anti-automation,Downtime,Sports,France,,,1,Germany,,,,,
-2011-262,WHID 2011-262: Hackers 'Timthumb' Their Noses At Vulnerability To Compromise 1.2 Million Sites,"A vulnerability in an obscure WordPress add-on script that was discovered in August is currently being used to compromise more than 1.2 million websites -- and could be easily used to siphon data out of databases hosted on servers also hosting the compromised websites, security experts warned today.",http://www.darkreading.com/database-security/167901020/security/news/231902162/hackers-timthumb-their-noses-at-vulnerability-to-compromise-1-2-million-sites.html,11/2/2011,Remote File Inclusion,Improper Input Handling,Planting of Malware,Multiple,Multiple,Yes,WordPress Timthumb,,,,,,,
-2011-262,WHID 2011-262: Hackers 'Timthumb' Their Noses At Vulnerability To Compromise 1.2 Million Sites,"A vulnerability in an obscure WordPress add-on script that was discovered in August is currently being used to compromise more than 1.2 million websites -- and could be easily used to siphon data out of databases hosted on servers also hosting the compromised websites, security experts warned today.",http://www.darkreading.com/database-security/167901020/security/news/231902162/hackers-timthumb-their-noses-at-vulnerability-to-compromise-1-2-million-sites.html,11/2/2011,Remote File Inclusion,Improper Input Handling,Planting of Malware,Multiple,Multiple,Yes,WordPress Timthumb,,,,,,,
-2011-263,WHID 2011-263: Adidas websites go offline after security breach,"Adidas said it became aware of a ""sophisticated, criminal cyber-attack"" on its various web sites on 3 November but the firm claimed it found no evidence that customers' data had been stole",http://www.theinquirer.net/inquirer/news/2123016/adidas-websites-offline-security-breach,11/3/2011,Unknown,Unknown,Downtime,Retail,,,,,,,TBA,,,
-2011-263,WHID 2011-263: Adidas websites go offline after security breach,"Adidas said it became aware of a ""sophisticated, criminal cyber-attack"" on its various web sites on 3 November but the firm claimed it found no evidence that customers' data had been stole",http://www.theinquirer.net/inquirer/news/2123016/adidas-websites-offline-security-breach,11/3/2011,Unknown,Unknown,Downtime,Retail,,,,,,,TBA,,,
-2011-264,"WHID 2011-264: Team Swastika group hacks 10,000 global Facebook account details","Security experts are warning web users to ensure they use strong passwords and vary their credentials from site to site after a new hacking group published log-in details of what it claimed to be more than 10,000 Facebook users.",http://www.v3.co.uk/v3-uk/news/2117965/team-swastika-hacks-global-facebook-accounts,10/18/2011,Unknown,Unknown,Leakage of Information,Web 2.0,"Palo Alto, CA",,,,,,,,,
-2011-264,"WHID 2011-264: Team Swastika group hacks 10,000 global Facebook account details","Security experts are warning web users to ensure they use strong passwords and vary their credentials from site to site after a new hacking group published log-in details of what it claimed to be more than 10,000 Facebook users.",http://www.v3.co.uk/v3-uk/news/2117965/team-swastika-hacks-global-facebook-accounts,10/18/2011,Unknown,Unknown,Leakage of Information,Web 2.0,"Palo Alto, CA",,,,,,,,,
-2011-265,WHID 2011-265: 4Chan Hackers Attack Yakoozo.com,"UK based hotel search engine Yakoozo.com ground to a halt recently after being subject to a major cyber-attack by users of the notorious image posting website 4chan. The attack took place on 12/10/2011 when internet users visiting Yakoozo where faced with explicit pornographic images, defaced pages and abusive text throughout the yakoozo website. 4Chan users coordinated the attack from the websites community posting real-time threads issuing instruction, orders and commands to users. This resulted in large traffic spikes, whilst up to 100 hackers breached website security. It is believed the attackers used SQL injection techniques to gain access, similar to the attacks on Nokia, world governments and countless other high profile attacks. Administrators have now removed the threads from their website.",http://www.webwire.com/ViewPressRel.asp?aId=147869,10/12/2011,SQL Injection,Improper Input Handling,Defacement,Search Engine,United Kingdom,,,,,,,,,
-2011-265,WHID 2011-265: 4Chan Hackers Attack Yakoozo.com,"UK based hotel search engine Yakoozo.com ground to a halt recently after being subject to a major cyber-attack by users of the notorious image posting website 4chan. The attack took place on 12/10/2011 when internet users visiting Yakoozo where faced with explicit pornographic images, defaced pages and abusive text throughout the yakoozo website. 4Chan users coordinated the attack from the websites community posting real-time threads issuing instruction, orders and commands to users. This resulted in large traffic spikes, whilst up to 100 hackers breached website security. It is believed the attackers used SQL injection techniques to gain access, similar to the attacks on Nokia, world governments and countless other high profile attacks. Administrators have now removed the threads from their website.",http://www.webwire.com/ViewPressRel.asp?aId=147869,10/12/2011,SQL Injection,Improper Input Handling,Defacement,Search Engine,United Kingdom,,,,,,,,,
-2011-266,WHID 2011-266: Air travel website Cheaptickets.nl hacked,"The personal details of 715,000 people who booked a flight through website CheapTickets.nl in 2008 and 2009 are in the hands of a hacker, website webwereld.nl reports on Monday.",http://www.dutchnews.nl/news/archives/2011/10/air_travel_website_cheapticket.php,10/24/2011,SQL Injection,Improper Input Handling,Leakage of Information,Travel,"Weert, NL",,,,,,,,,
-2011-266,WHID 2011-266: Air travel website Cheaptickets.nl hacked,"The personal details of 715,000 people who booked a flight through website CheapTickets.nl in 2008 and 2009 are in the hands of a hacker, website webwereld.nl reports on Monday.",http://www.dutchnews.nl/news/archives/2011/10/air_travel_website_cheapticket.php,10/24/2011,SQL Injection,Improper Input Handling,Leakage of Information,Travel,"Weert, NL",,,,,,,,,
-2011-267,WHID 2011-267: Anonymous shuts down hidden child abuse hub,"Anonymous then began a series of denial-of-service attacks aimed at Freedom Hosting, and most particularly Lolita City. The user database of the site was extracted using a SQL injection attack, ars technica reports.",http://www.theregister.co.uk/2011/10/24/anonymous_fight_child_abuse_network/,10/24/2011,SQL Injection,Improper Input Handling,Leakage of Information,File Sharing,,,,,,,,,,
-2011-267,WHID 2011-267: Anonymous shuts down hidden child abuse hub,"Anonymous then began a series of denial-of-service attacks aimed at Freedom Hosting, and most particularly Lolita City. The user database of the site was extracted using a SQL injection attack, ars technica reports.",http://www.theregister.co.uk/2011/10/24/anonymous_fight_child_abuse_network/,10/24/2011,SQL Injection,Improper Input Handling,Leakage of Information,File Sharing,,,,,,,,,,
-2011-268,WHID 2011-268: Hackers hit Nigeria anti-fraud agency website,Hackers have hit the website of Nigeria's top anti-corruption agency over a government official suggesting tighter Internet control in Africa's most populous nation.,http://www.google.com/hostednews/ap/article/ALeqM5gM03EX-AyBLqhTSCq3aFLSG0KZ2Q?docId=9d74815d22d84a989110e038db9f9330,10/28/2011,Unknown,Unknown,Defacement,Government,"Lagos, Nigeria",,,,,,,,,
-2011-268,WHID 2011-268: Hackers hit Nigeria anti-fraud agency website,Hackers have hit the website of Nigeria's top anti-corruption agency over a government official suggesting tighter Internet control in Africa's most populous nation.,http://www.google.com/hostednews/ap/article/ALeqM5gM03EX-AyBLqhTSCq3aFLSG0KZ2Q?docId=9d74815d22d84a989110e038db9f9330,10/28/2011,Unknown,Unknown,Defacement,Government,"Lagos, Nigeria",,,,,,,,,
-2011-269,"WHID 2011-269: Massive Swedish Hacks Leak 400,000 Account Details","The source of the passwords turned out to be blogging site Bloggtoppen.se, which was vulnerable to an SQL injection attack. Its user database, which included details for approximately 94,000 accounts, was published back in September on a site called Flashback, and then distributed via Twitter, as well.",http://www.pcworld.com/businesscenter/article/242700/massive_swedish_hacks_leak_400000_account_details.html,10/27/2011,SQL Injection,Improper Input Handling,Leakage of Information,Blogs,Sweden,,,,,,,,,
-2011-269,"WHID 2011-269: Massive Swedish Hacks Leak 400,000 Account Details","The source of the passwords turned out to be blogging site Bloggtoppen.se, which was vulnerable to an SQL injection attack. Its user database, which included details for approximately 94,000 accounts, was published back in September on a site called Flashback, and then distributed via Twitter, as well.",http://www.pcworld.com/businesscenter/article/242700/massive_swedish_hacks_leak_400000_account_details.html,10/27/2011,SQL Injection,Improper Input Handling,Leakage of Information,Blogs,Sweden,,,,,,,,,
-2011-26,WHID 2011-26: Tunisian government harvesting usernames and passwords,"The Tunisian Internet Agency (Agence tunisienne d'Internet or ATI) is being blamed for the presence of injected JavaScript that captures usernames and passwords. The code has been discovered on login pages for Gmail, Yahoo, and Facebook, and said to be the reason for the recent rash of account hijackings reported by Tunisian protesters.",http://www.thetechherald.com/article.php/201101/6651/Tunisian-government-harvesting-usernames-and-passwords,1/4/2011,Content Injection,Insufficient Transport Layer Protection,Stolen Credentials,Web 2.0,,No,,,,GMail,,,,
-2011-26,WHID 2011-26: Tunisian government harvesting usernames and passwords,"The Tunisian Internet Agency (Agence tunisienne d'Internet or ATI) is being blamed for the presence of injected JavaScript that captures usernames and passwords. The code has been discovered on login pages for Gmail, Yahoo, and Facebook, and said to be the reason for the recent rash of account hijackings reported by Tunisian protesters.",http://www.thetechherald.com/article.php/201101/6651/Tunisian-government-harvesting-usernames-and-passwords,1/4/2011,Content Injection,Insufficient Transport Layer Protection,Stolen Credentials,Web 2.0,,No,,,,GMail,,,,
-2011-270,WHID 2011-270: Attackers Trick Facebook Users Into Exposing Secret Security Codes,New social engineering attacks are tricking Facebook users into exposing anti-CSRF tokens associated with their sessions. These security codes allow attackers to make unauthorized requests through the victim's browser.,http://www.pcworld.com/businesscenter/article/242711/attackers_trick_facebook_users_into_exposing_secret_security_codes.html,10/27/2011,Social Engineering,Insufficient Process Validation,Account Takeover,Web 2.0,"Palo Alto, CA",,,,,,,,,
-2011-270,WHID 2011-270: Attackers Trick Facebook Users Into Exposing Secret Security Codes,New social engineering attacks are tricking Facebook users into exposing anti-CSRF tokens associated with their sessions. These security codes allow attackers to make unauthorized requests through the victim's browser.,http://www.pcworld.com/businesscenter/article/242711/attackers_trick_facebook_users_into_exposing_secret_security_codes.html,10/27/2011,Social Engineering,Insufficient Process Validation,Account Takeover,Web 2.0,"Palo Alto, CA",,,,,,,,,
-2011-271,WHID 2011-271: Hacked MIT server is blamed for brute force web site attacks,"A report on the firm's security blog, called Malware City, claims that a hacking attack against the MIT.edu infrastructure started with a malicious script on one MIT server.",http://www.theinquirer.net/inquirer/news/2122546/hacked-mit-server-blamed-brute-force-web-site-attacks,11/3/2011,Unknown,Unknown,Planting of Malware,Education,"Cambridge, MA",,,,,,,,,
-2011-271,WHID 2011-271: Hacked MIT server is blamed for brute force web site attacks,"A report on the firm's security blog, called Malware City, claims that a hacking attack against the MIT.edu infrastructure started with a malicious script on one MIT server.",http://www.theinquirer.net/inquirer/news/2122546/hacked-mit-server-blamed-brute-force-web-site-attacks,11/3/2011,Unknown,Unknown,Planting of Malware,Education,"Cambridge, MA",,,,,,,,,
-2011-272,WHID 2011-272: Anonymous downs official sites in El Salvador,"Hacktivist group Anonymous has attacked the websites of El Salvador's presidency and government ministries, forcing several to be shut down. The group's ""Operation Justice El Salvador"" comes two weeks after Anonymous threatened several government websites, according to Australian reports. The website of the presidency was suspended at the weekend after it was bombarded with 30 million hits on Saturday in a denial-of-service (DoS) attack.",http://www.computerweekly.com/Articles/2011/11/07/248383/Anonymous-downs-official-sites-in-El-Salvador.htm,11/7/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,El Salvador,Yes,Operation Justice El Salvador,,,,,,,
-2011-272,WHID 2011-272: Anonymous downs official sites in El Salvador,"Hacktivist group Anonymous has attacked the websites of El Salvador's presidency and government ministries, forcing several to be shut down. The group's ""Operation Justice El Salvador"" comes two weeks after Anonymous threatened several government websites, according to Australian reports. The website of the presidency was suspended at the weekend after it was bombarded with 30 million hits on Saturday in a denial-of-service (DoS) attack.",http://www.computerweekly.com/Articles/2011/11/07/248383/Anonymous-downs-official-sites-in-El-Salvador.htm,11/7/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,El Salvador,Yes,Operation Justice El Salvador,,,,,,,
-2011-273,WHID 2011-273: DoS attack takes Palestinians offline,"Large denial of service attacks have rocked Palestinian, severing internet service to the West Bank and Gaza late last week.","http://www.itnews.com.au/News/279230,dos-attack-takes-palestinians-offline.aspx",11/7/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Nablus, PS",Yes,,,,,,,,
-2011-273,WHID 2011-273: DoS attack takes Palestinians offline,"Large denial of service attacks have rocked Palestinian, severing internet service to the West Bank and Gaza late last week.","http://www.itnews.com.au/News/279230,dos-attack-takes-palestinians-offline.aspx",11/7/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Nablus, PS",Yes,,,,,,,,
-2011-274,WHID 2011-274: Turkish hacker shuts down French magazine website for Islamic prophet cartoon,"A Turkish hacker has claimed credit for bringing down the website of a French satirical weekly that published an issue named ???Charia Hebdo,??? with a caricature of the Islamic prophet Muhammad on the cover.",http://www.taiwannews.com.tw/etn/news_content.php?id=1751509,11/7/2011,Unknown,Unknown,Downtime,Media,France,,,,,,,,,
-2011-274,WHID 2011-274: Turkish hacker shuts down French magazine website for Islamic prophet cartoon,"A Turkish hacker has claimed credit for bringing down the website of a French satirical weekly that published an issue named ???Charia Hebdo,??? with a caricature of the Islamic prophet Muhammad on the cover.",http://www.taiwannews.com.tw/etn/news_content.php?id=1751509,11/7/2011,Unknown,Unknown,Downtime,Media,France,,,,,,,,,
-2011-275,WHID 2011-275: Certificate Authority Uncovers Old Breach,KPN announced this week that it has suspended issuing certificates after discovering the breach of a PKI-related Web server with a distributed denial-of-service tool that apparently had been sitting on the server for at least four years.,http://www.informationweek.com/news/security/attacks/231902582,11/8/2011,Unknown,Unknown,Monetary Loss,Retail,"Amersfoort, NE",,,,,,,,,
-2011-275,WHID 2011-275: Certificate Authority Uncovers Old Breach,KPN announced this week that it has suspended issuing certificates after discovering the breach of a PKI-related Web server with a distributed denial-of-service tool that apparently had been sitting on the server for at least four years.,http://www.informationweek.com/news/security/attacks/231902582,11/8/2011,Unknown,Unknown,Monetary Loss,Retail,"Amersfoort, NE",,,,,,,,,
-2011-276,WHID 2011-276: Hackers poison Brazilian ISP DNS to infect users with banking Trojan,DNS servers from multiple Brazilian ISPs were compromised to direct users to malicious websites,http://news.techworld.com/security/3317148/hackers-poison-brazilian-isp-dns-to-infect-users-with-banking-trojan/,11/9/2011,DNS Hijacking,Unknown,Planting of Malware,Service Providers,Brazil,,,,,,,,,
-2011-276,WHID 2011-276: Hackers poison Brazilian ISP DNS to infect users with banking Trojan,DNS servers from multiple Brazilian ISPs were compromised to direct users to malicious websites,http://news.techworld.com/security/3317148/hackers-poison-brazilian-isp-dns-to-infect-users-with-banking-trojan/,11/9/2011,DNS Hijacking,Unknown,Planting of Malware,Service Providers,Brazil,,,,,,,,,
-2011-277,WHID 2011-277: Cyber attacks hit Fujitsu local government system,"A Fujitsu computer system run by about 200 Japanese local governments has been hit by a series of cyber attacks and is in a vulnerable condition, the company said Thursday.",http://news.yahoo.com/cyber-attacks-hit-fujitsu-local-government-system-075757705.html,11/10/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Fukuoka, Japan",Yes,,,,,,,,
-2011-277,WHID 2011-277: Cyber attacks hit Fujitsu local government system,"A Fujitsu computer system run by about 200 Japanese local governments has been hit by a series of cyber attacks and is in a vulnerable condition, the company said Thursday.",http://news.yahoo.com/cyber-attacks-hit-fujitsu-local-government-system-075757705.html,11/10/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Fukuoka, Japan",Yes,,,,,,,,
-2011-278,WHID 2011-278: St. Louis mayor's website hacked by Occupy sympathizer,A hacker claiming to be part of the network Anonymous broke into the mayor of St. Louis's website and left a message of support for anti-Wall Street protesters threatened with eviction from their campsite.,"http://www.wtvr.com/sns-rt-us-protests-hacking-stlouistre7a90c4-20111109,0,3618302.story",11/9/2011,Unknown,Unknown,Defacement,Government,"St. Louis, MO",,,1,Unknown,,,Personal Information,2000,
-2011-278,WHID 2011-278: St. Louis mayor's website hacked by Occupy sympathizer,A hacker claiming to be part of the network Anonymous broke into the mayor of St. Louis's website and left a message of support for anti-Wall Street protesters threatened with eviction from their campsite.,"http://www.wtvr.com/sns-rt-us-protests-hacking-stlouistre7a90c4-20111109,0,3618302.story",11/9/2011,Unknown,Unknown,Defacement,Government,"St. Louis, MO",,,1,Unknown,,,Personal Information,2000,
-2011-279,"WHID 2011-279: Steam game service hacked, credit card theft investigated",Valve Corporation has become the latest game company to fall victim to a major hacking intrusion that has left gamers' personal information and potentially even credit card numbers exposed.,http://ingame.msnbc.msn.com/_news/2011/11/10/8742607-steam-game-service-hacked-credit-card-theft-investigated,11/11/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,"Maple Valley, WA",,,,,,,,,
-2011-279,"WHID 2011-279: Steam game service hacked, credit card theft investigated",Valve Corporation has become the latest game company to fall victim to a major hacking intrusion that has left gamers' personal information and potentially even credit card numbers exposed.,http://ingame.msnbc.msn.com/_news/2011/11/10/8742607-steam-game-service-hacked-credit-card-theft-investigated,11/11/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,"Maple Valley, WA",,,,,,,,,
-2011-27,WHID 2011-27: FarmVille possibly hacked,"For those who aren't normally lurking the FarmVille forums, they've been in an uproar over a FarmVille player known as Ek????n Man. According to several forum users, this player has been posting messages on their Walls via the FarmVille app, but none of them are actually friends with him.",http://blog.games.com/2011/01/26/farmville-possibly-hacked/,1/26/2011,Unknown,Insufficient Authorization,Disinformation,Web 2.0,,No,,,,,,,,
-2011-27,WHID 2011-27: FarmVille possibly hacked,"For those who aren't normally lurking the FarmVille forums, they've been in an uproar over a FarmVille player known as Ek????n Man. According to several forum users, this player has been posting messages on their Walls via the FarmVille app, but none of them are actually friends with him.",http://blog.games.com/2011/01/26/farmville-possibly-hacked/,1/26/2011,Unknown,Insufficient Authorization,Disinformation,Web 2.0,,No,,,,,,,,
-2011-280,WHID 2011-280: State TV website hacked to protest clashes coverage,Egypt???s official State Television Network website was attacked on Sunday by hackers who left a message on the site???s main page condemning state media coverage of Saturday ???s clashes in Tahrir Square between protesters and security forces.,http://english.ahram.org.eg/NewsContent/1/64/27062/Egypt/Politics-/State-TV-website-hacked-to-protest-clashes-coverag.aspx,11/20/2011,Unknown,Unknown,Downtime,Television,Egypt,No,N/A,1,Unknown,,,,,
-2011-280,WHID 2011-280: State TV website hacked to protest clashes coverage,Egypt???s official State Television Network website was attacked on Sunday by hackers who left a message on the site???s main page condemning state media coverage of Saturday ???s clashes in Tahrir Square between protesters and security forces.,http://english.ahram.org.eg/NewsContent/1/64/27062/Egypt/Politics-/State-TV-website-hacked-to-protest-clashes-coverag.aspx,11/20/2011,Unknown,Unknown,Downtime,Television,Egypt,No,N/A,1,Unknown,,,,,
-2011-281,"WHID 2011-281: City's website hacked, no information compromised",The city of Bowling Green's website is back to normal after being broken into by hackers over the weekend.,http://www.fox19.com/story/16137276/citys-website-hacked-no-information-compromised,11/27/2011,Unknown,Unknown,Defacement,Government,Kentucky,N/A,N/A,1,Unknown,Unknown,,,0,
-2011-281,"WHID 2011-281: City's website hacked, no information compromised",The city of Bowling Green's website is back to normal after being broken into by hackers over the weekend.,http://www.fox19.com/story/16137276/citys-website-hacked-no-information-compromised,11/27/2011,Unknown,Unknown,Defacement,Government,Kentucky,N/A,N/A,1,Unknown,Unknown,,,0,
-2011-282,WHID 2011-282: Mexican weekly goes offline after cyberattack,The Committee to Protect Journalists is concerned by reports of a cyberattack on Mexican weekly R?_odoce that forced its website offline on Friday.,http://www.cpj.org/2011/11/mexican-weekly-goes-offline-after-cyberattack.php,11/25/2011,Denial of Service,Insufficient Anti-automation,Downtime,Newspaper,Mexico,Yes,DDoS,1,Mexico,Unknown,Unknown,0,0,
-2011-282,WHID 2011-282: Mexican weekly goes offline after cyberattack,The Committee to Protect Journalists is concerned by reports of a cyberattack on Mexican weekly R?_odoce that forced its website offline on Friday.,http://www.cpj.org/2011/11/mexican-weekly-goes-offline-after-cyberattack.php,11/25/2011,Denial of Service,Insufficient Anti-automation,Downtime,Newspaper,Mexico,Yes,DDoS,1,Mexico,Unknown,Unknown,0,0,
-2011-283,WHID 2011-283: United Nations Website Hacked,"Hacking attacks continue to happen all over the world. This time, a hacker group, which calls itself ""Teampoison"", attacked the website of the United Nations and posted personal information belonging to UN members on Pastebin.",http://www.shortnews.com/start.cfm?id=91152,11/30/2011,Unknown,Unknown,Leakage of Information,United Nations,New York,N/A,N/A,1,Unknown,Unknown,Unknown,email addresses and credentials,More than 100 email addresses and login details,
-2011-283,WHID 2011-283: United Nations Website Hacked,"Hacking attacks continue to happen all over the world. This time, a hacker group, which calls itself ""Teampoison"", attacked the website of the United Nations and posted personal information belonging to UN members on Pastebin.",http://www.shortnews.com/start.cfm?id=91152,11/30/2011,Unknown,Unknown,Leakage of Information,United Nations,New York,N/A,N/A,1,Unknown,Unknown,Unknown,email addresses and credentials,More than 100 email addresses and login details,
-2011-284,WHID 2011-284: Websites downed in Russia poll 'hack attack',Websites which revealed violations in Russia's legislative polls were targeted in a mass hacking attack Sunday their operators said was aimed at preventing the exposure of mass election fraud.,http://www.google.com/hostednews/afp/article/ALeqM5hAnXDOHgstjNt-eH4tBzon2B96Aw?docId=CNG.5b3137d37ca033f82d1946db0c21911c.151,12/4/2011,Denial of Service,Unknown,Downtime,Radio station,Russia,Yes,Unknown,2,Russia,Unknown,,,,
-2011-284,WHID 2011-284: Websites downed in Russia poll 'hack attack',Websites which revealed violations in Russia's legislative polls were targeted in a mass hacking attack Sunday their operators said was aimed at preventing the exposure of mass election fraud.,http://www.google.com/hostednews/afp/article/ALeqM5hAnXDOHgstjNt-eH4tBzon2B96Aw?docId=CNG.5b3137d37ca033f82d1946db0c21911c.151,12/4/2011,Denial of Service,Unknown,Downtime,Radio station,Russia,Yes,Unknown,2,Russia,Unknown,,,,
-2011-285,"WHID 2011-285: Cong site hacked, Sonia???s profile page defaced","Amid the raging debate over the government???s proposal to crack down on ???unacceptable??? internet content, hackers broke into Congress websites on Friday and defaced party chief Sonia Gandhi's profile page with objectionable material.",http://www.hindustantimes.com/News-Feed/newdelhi/Congress-website-hacked-Sonia-s-profile-page-defaced/Article1-780256.aspx,12/9/2011,Unknown,Unknown,Defacement,Government,India,No,NA,2,Unknown,Unknown,Unknown,None,None,
-2011-285,"WHID 2011-285: Cong site hacked, Sonia???s profile page defaced","Amid the raging debate over the government???s proposal to crack down on ???unacceptable??? internet content, hackers broke into Congress websites on Friday and defaced party chief Sonia Gandhi's profile page with objectionable material.",http://www.hindustantimes.com/News-Feed/newdelhi/Congress-website-hacked-Sonia-s-profile-page-defaced/Article1-780256.aspx,12/9/2011,Unknown,Unknown,Defacement,Government,India,No,NA,2,Unknown,Unknown,Unknown,None,None,
-2011-286,WHID-2011-287: Chinese gaming sites hacked: Millions of users affected,"Thousands of accounts belonging to Xbox Live customers have been hacked into by online criminals who have stolen millions of pounds, it has been reported",http://www.telegraph.co.uk/technology/video-games/Xbox/8906043/Xbox-Live-customers-hacked-in-fresh-cyber-fraud-case.html,11/22/2011,Phishing,Insufficient Authentication,Monetary Loss,Entertainment,"Tempe, AZ",,,,,,,,,
-2011-286,WHID-2011-287: Chinese gaming sites hacked: Millions of users affected,"Thousands of accounts belonging to Xbox Live customers have been hacked into by online criminals who have stolen millions of pounds, it has been reported",http://www.telegraph.co.uk/technology/video-games/Xbox/8906043/Xbox-Live-customers-hacked-in-fresh-cyber-fraud-case.html,11/22/2011,Phishing,Insufficient Authentication,Monetary Loss,Entertainment,"Tempe, AZ",,,,,,,,,
-2011-287,WHID-2011-286: Chinese gaming sites hacked: Millions of users affected,"The accounts of millions of Chinese web users have been compromised in a series of hacking attacks on several gaming websites, with account information leaking online",http://www.zdnet.com/blog/asia/chinese-gaming-sites-hacked-millions-of-users-affected/579,12/22/2011,Unknown,Unknown,Leakage of Information,Gaming,China,No,N/A,Multiple,Unknown,Unknown,,User credentials,Over six million accounts,
-2011-287,WHID-2011-286: Chinese gaming sites hacked: Millions of users affected,"The accounts of millions of Chinese web users have been compromised in a series of hacking attacks on several gaming websites, with account information leaking online",http://www.zdnet.com/blog/asia/chinese-gaming-sites-hacked-millions-of-users-affected/579,12/22/2011,Unknown,Unknown,Leakage of Information,Gaming,China,No,N/A,Multiple,Unknown,Unknown,,User credentials,Over six million accounts,
-2011-288,WHID 2011-288: Hacker group Anonymous steals sensitive info from Stratfor security firm,"Hacker collective Anonymous claims to have stolen credit card data and other sensitive details from U.S. security think tank Stratfor, with plans to donate $1 million in stolen cash to charity.",http://venturebeat.com/2011/12/25/anonymous-hackers-steals-data-stratfor-security/,12/24/2011,Unknown,Unknown,"Defacement, Leakage of Information",Research,"Austin, TX",Unknown,Unknown,1,Unknown,,,"Credit card information, personally identifiable information",,
-2011-288,WHID 2011-288: Hacker group Anonymous steals sensitive info from Stratfor security firm,"Hacker collective Anonymous claims to have stolen credit card data and other sensitive details from U.S. security think tank Stratfor, with plans to donate $1 million in stolen cash to charity.",http://venturebeat.com/2011/12/25/anonymous-hackers-steals-data-stratfor-security/,12/24/2011,Unknown,Unknown,"Defacement, Leakage of Information",Research,"Austin, TX",Unknown,Unknown,1,Unknown,,,"Credit card information, personally identifiable information",,
-2011-289,"WHID 2011-289: Hacked! Environmental activism site Care2, users exposed","Care2.com, a site dedicated to environmental awareness, petitioning, and charitible donation with more than 17 million members has been hacked, according to a message from the company Friday morning.",http://betanews.com/2011/12/30/hacked-environmental-activism-site-care2-users-exposed/,12/30/2011,Unknown,Unknown,Leakage of Information,Environmental Protection,"Redwood, CA",Unknown,Unknown,1,Unknown,"Apache Web Server, PHP",,,,
-2011-289,"WHID 2011-289: Hacked! Environmental activism site Care2, users exposed","Care2.com, a site dedicated to environmental awareness, petitioning, and charitible donation with more than 17 million members has been hacked, according to a message from the company Friday morning.",http://betanews.com/2011/12/30/hacked-environmental-activism-site-care2-users-exposed/,12/30/2011,Unknown,Unknown,Leakage of Information,Environmental Protection,"Redwood, CA",Unknown,Unknown,1,Unknown,"Apache Web Server, PHP",,,,
-2011-28,WHID 2011-28: Mysterious 'Roy Castillo' haunts Facebook,"He arrived on Wednesday, around the same time Facebook CEO Mark Zuckerburg???s Facebook fan page was hacked. Roy Castillo ??? the ghost ""friend""with a man???s name and a profile pic of a teenage girl wearing sunglasses ??? popped up in the Facebook newsfeeds with the curt status: ""Off to Danao City.""
-2011-29,WHID 2011-29: PlentyofFish Site Hacked,"""The vulnerability was properly documented by our team, without exposing any confidential user information,"" he writes. ""This was an error based MSSQL injection, that could allow any attacker to make a full backup of the databases used by the websever, and or gain direct access into the site.""",http://www.net-security.org/secworld.php?id=10514,1/31/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,"Yarmouth, Nova Scotia",No,,,,,,,,http://www.youtube.com/watch?v=7RBYkk5Vq4M
-2011-29,WHID 2011-29: PlentyofFish Site Hacked,"""The vulnerability was properly documented by our team, without exposing any confidential user information,"" he writes. ""This was an error based MSSQL injection, that could allow any attacker to make a full backup of the databases used by the websever, and or gain direct access into the site.""",http://www.net-security.org/secworld.php?id=10514,1/31/2011,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,"Yarmouth, Nova Scotia",No,,,,,,,,http://www.youtube.com/watch?v=7RBYkk5Vq4M
-2011-2,WHID 2011-2: Attacks on Lush website expose credit-card details,"Cosmetics company Lush has warned customers that its UK website has been hacked repeatedly over the past three months, exposing credit-card details to fraudulent use. The website of cosmetics retailer Lush has been hacked repeatedly over the last three months. Lush did not release technical details of the attack, nor specify the number of customers compromised or the security techniques used to handle the data involved, but anecdotal evidence indicates that some customers have been the victims of fraud. The company sent an email statement to customers on Thursday outlining the incident and urging them to contact their banks.",http://www.zdnet.co.uk/news/security/2011/01/21/attacks-on-lush-website-expose-credit-card-details-40091520/,1/20/2011,SQL Injection,Improper Input Handling,Credit Card Leakage,Retail,United Kingdom,No,,,,,,,,
-2011-30,WHID 2011-30: Facebook plugs gnarly authentication flaw,"the vulnerability stems from a bug in one of Facebook???s authentication mechanisms, Rui explained.
-2011-31,WHID 2011-31: Hacker admits stealing $12million worth of poker chips from US gaming company,"A COMPUTER hacker from Paignton has admitted stealing $12million worth of poker chips from an American gaming company.
-2011-32,WHID 2011-32: European Carbon Trading Systems Hacked,"Cyberattacks on national registries caused the closure of the ETS system last wednesday, right after from Czech Republic came the news that the firm Blackstone Global Ventures discovered to be missing something close to 9 million US dollars of carbon allowances.",http://www.estonianfreepress.com/2011/01/ets-carbon-cyberattack/,1/19/2011,Unknown,Unknown,Monetary Loss,Energy,,No,,,,,"$9,000,000 ",Carbon Trading Credits,,http://www.ote-cr.cz/about-ote/OTE_news/tiskova-zprava-k-aktualni-situaci-v-ceskem-rejstriku-emisnich-povolenek
-2011-32,WHID 2011-32: European Carbon Trading Systems Hacked,"Cyberattacks on national registries caused the closure of the ETS system last wednesday, right after from Czech Republic came the news that the firm Blackstone Global Ventures discovered to be missing something close to 9 million US dollars of carbon allowances.",http://www.estonianfreepress.com/2011/01/ets-carbon-cyberattack/,1/19/2011,Unknown,Unknown,Monetary Loss,Energy,,No,,,,,$9000000,Carbon Trading Credits,,http://www.ote-cr.cz/about-ote/OTE_news/tiskova-zprava-k-aktualni-situaci-v-ceskem-rejstriku-emisnich-povolenek
-2011-33,WHID 2011-33: Anonymous Hackers Attack Yemeni Government,"Anonymous took down Egyptian government websites today to protest the country's Internet censorship. Old news. Now they've moved on to Yemen, where an Egypt-style ""day of rage"" is scheduled for tomorrow. Hackers have already taken down the Ministry of Information.",http://gawker.com/5750513/anonymous-hackers-already-taking-down-yemeni-websites,2/2/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,Yemin,No,,,,,,,,
-2011-33,WHID 2011-33: Anonymous Hackers Attack Yemeni Government,"Anonymous took down Egyptian government websites today to protest the country's Internet censorship. Old news. Now they've moved on to Yemen, where an Egypt-style ""day of rage"" is scheduled for tomorrow. Hackers have already taken down the Ministry of Information.",http://gawker.com/5750513/anonymous-hackers-already-taking-down-yemeni-websites,2/2/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,Yemin,No,,,,,,,,
-2011-34,WHID 2011-34: Al Jazeera site 'hacked by opponents of pro-democracy movement' in Egypt,"Al Jazeera's Arabic news website was hacked into today following its coverage of anti-government protests in Egypt, according to the Qatar-based broadcaster.
-2011-35,"WHID 2011-35: 'Dating site' takes pictures and names of 250,000 unsuspecting Facebook users","Creators of a fake dating site have taken personal information from 250,000 Facebook profiles - and reproduced it without the knowledge of the members of the popular social networking site.
-2011-36,WHID 2011-36: Credit report resellers settle with US FTC after data losses,"As part of the Federal Trade Commission???s ongoing campaign to protect consumers??? personal information, three companies whose business is reselling consumers??? credit reports have agreed to settle FTC charges that they did not take reasonable steps to protect consumers??? personal information, failures that allowed computer hackers to access that data. The settlements require the companies to strengthen their data security procedures and submit to audits for 20 years. These are the FTC???s first cases against credit report resellers for their clients??? data security failures.
-2011-37,WHID 2011-37: Nasdaq admits hackers planted malware on web portal,"Nasdaq admitted on Saturday that unidentified hackers had succeeded in planting malware on one of its portals.
-2011-38,WHID 2011-38: HBGary Federal Hacked by Anonymous,"In a phone interview late Sunday evening, Hoglund said that unlike the more traditional Web-site attacking activities of Anonymous, the hackers who infiltrated HBGary???s system showed real skills, even social engineering a network administrator into giving them complete control over rootkit.com, a security research site Hoglund has long maintained.
-2011-39,WHID 2011-39: Hackers Breach Tech Systems of Oil Companies,"At least five multinational oil and gas companies suffered computer network intrusions from a persistent group of computer hackers based in China, according to a report released Wednesday night by a Silicon Valley computer security firm.
-2011-3,WHID 2011-3: Hacked Military and Government Sites Just Scratch the Surface,"The Web has been abuzz with the revelation that hacked government and military Web sites, as well as databases of personal information are available for less than $500. As concerning as that may be, what should keep IT admins awake at night is the broader realization that these are only the hacked sites that were discovered on the hacker underground. There are more, and your site could be one of them.",http://www.pcworld.com/businesscenter/article/217472/hacked_military_and_government_sites_just_scratch_the_surface.html,1/21/2011,SQL Injection,Improper Input Handling,Leakage of Information,Government,,Yes,,44,,,,,,
-2011-40,WHID 2011-40: eHarmony Hacked,"Joseph Essas, chief technology officer at eHarmony, said Russo found a SQL injection vulnerability in one of the third party libraries that eHarmony has been using for content management on the company???s advice site ??? advice.eharmony.com. Essas said there were no signs that accounts at its main user site ??? eharmony.com ??? were affected.
-2011-41,WHID 2011-41: English Defence League site pulled offline after defacement,The website of the far right English Defence League remained unavailable on Friday following a hack attack on Wednesday.,http://www.theregister.co.uk/2011/02/11/edl_defacement/,2/11/2011,Unknown,Unknown,Defacement,Government,England,No,,,,,,,,
-2011-41,WHID 2011-41: English Defence League site pulled offline after defacement,The website of the far right English Defence League remained unavailable on Friday following a hack attack on Wednesday.,http://www.theregister.co.uk/2011/02/11/edl_defacement/,2/11/2011,Unknown,Unknown,Defacement,Government,England,No,,,,,,,,
-2011-42,WHID 2011-42: Irish recruitment website hacked,"The Irish job website RecruitIreland.com was hacked earlier this week, resulting in breached systems and the theft of the credentials of 400,000 users.
-2011-43,WHID 2011-43: BBC music websites get hacked,"THE BBC'S MUSIC WEBSITES have been hacked to stream malware using drive-by downloads for anyone browsing the infected webpages.
-2011-44,WHID 2011-44: Credit cards compromised as hackers target beauty site,"The Lush UK website was recently compromised and the company says while the New Zealand and Australian sites are not linked to the UK site, both have also been targeted by hackers.
-2011-45,WHID 2011-45: Facebook users subjected to more clickjacking,"Facebook users have been subjected to another round of clickjacking attacks that force them to authorize actions they had no intention of approving.
-2011-46,WHID 2011-46: Kansas Car Dealership Bank Accounts Hacked,"An online bank robbery in which computer crooks stole $63,000 from a Kansas car dealership illustrates the deftness with which cyber thieves are flouting the meager security measures protecting commercial accounts at many banks.",http://krebsonsecurity.com/2011/02/sold-a-lemon-in-internet-banking/,2/23/2011,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,Kansas,No,,,,,"$63,000 ",,,
-2011-46,WHID 2011-46: Kansas Car Dealership Bank Accounts Hacked,"An online bank robbery in which computer crooks stole $63,000 from a Kansas car dealership illustrates the deftness with which cyber thieves are flouting the meager security measures protecting commercial accounts at many banks.",http://krebsonsecurity.com/2011/02/sold-a-lemon-in-internet-banking/,2/23/2011,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,Kansas,No,,,,,$63000,,,
-2011-47,WHID 2011-47: DDoS attack forces Dutch bank offline,The outage of Dutch bank Rabobank last weekend was caused by a massive DDoS attack. The perpetrators are still unknown. The bank reports the attack to the police.,http://news.idg.no/cw/art.cfm?id=3F6822FF-1A64-6A71-CE67724BB606D61C,2/19/2011,Denial of Service,Insufficient Anti-automation,Downtime,Finance,Denmark,No,,,,,,,,
-2011-47,WHID 2011-47: DDoS attack forces Dutch bank offline,The outage of Dutch bank Rabobank last weekend was caused by a massive DDoS attack. The perpetrators are still unknown. The bank reports the attack to the police.,http://news.idg.no/cw/art.cfm?id=3F6822FF-1A64-6A71-CE67724BB606D61C,2/19/2011,Denial of Service,Insufficient Anti-automation,Downtime,Finance,Denmark,No,,,,,,,,
-2011-48,WHID 2011-48: Pro-Iranian Cyber Hackers Attack Voice of America,"The board for VOA said cyber hackers hacked into Voice of America???s primary domain name (VOANews.com), and then redirected visitors to another web site claiming to be run by the ""Iranian Cyber Army,"" Numerous related domains registered with Network Solutions were also hacked into, and web visitors were also redirected to the web site supposedly run by the ???Iranian Cyber Army.???",http://www.foxbusiness.com/markets/2011/02/23/pro-iranian-cyber-hackers-attack-voice-america/,2/23/2011,DNS Hijacking,Insufficient Authentication,Defacement,Media,"Washington, DC",No,,,Iran,,,,,
-2011-48,WHID 2011-48: Pro-Iranian Cyber Hackers Attack Voice of America,"The board for VOA said cyber hackers hacked into Voice of America???s primary domain name (VOANews.com), and then redirected visitors to another web site claiming to be run by the ""Iranian Cyber Army,"" Numerous related domains registered with Network Solutions were also hacked into, and web visitors were also redirected to the web site supposedly run by the ???Iranian Cyber Army.???",http://www.foxbusiness.com/markets/2011/02/23/pro-iranian-cyber-hackers-attack-voice-america/,2/23/2011,DNS Hijacking,Insufficient Authentication,Defacement,Media,"Washington, DC",No,,,Iran,,,,,
-2011-49,WHID 2011-49: WordPress hit by 'extremely large' DDoS attack,"Blog host WordPress.com was the target of a distributed denial-of-service (DDoS) attack earlier today described by the company as the largest in its history.
-2011-4,WHID 2011-4: Trapster Hacked,"A website that helps drivers avoid speeding tickets is warning its 10 million registered users that their email addresses and passwords may be in the hands of hackers who breached the site's security. The advisory was issued on Thursday by Trapster, which boasts more than 10 million users on its front page. The site uses crowd-sourcing techniques to compile locations of police who are using radar to catch speeding drivers. Trapster said the hack amounted to a ???single event,??? and that the company has since taken steps to ???prevent this type of attack from happening again, and continue to implement additional security measures to further protect your data.??? Trapster didn't say whether it planned to begin hashing passwords, which is considered a basic security precaution to prevent their disclosure.",http://www.theregister.co.uk/2011/01/21/trapster_website_hack/,1/20/2011,Unknown,Unknown,Leakage of Information,Web 2.0,,No,,,,,,,,
-2011-50,WHID 2011-50: Celebrity Ashton Kutcher Firesheep'd at TED Conference,"High profile celebrity Ashton Kutcher had his Twitter account hijacked at the celebrity infested Technology, Entertainment, Design (TED) Conference, TED2011, in Long Beach, California, on Wednesday.
-2011-51,WHID 2011-51: WordPress Hit by Second Massive Attack in Two Days,"The main WordPress.com site was the target of a major DDoS attack yesterday that knocked the popular blogging platform offline for a couple of hours, and another attack that hit the site again Friday morning. The service is back online now, but the attacks may be an indication that the service could be collateral damage in some politically motivated attacks against WordPress blogs.",http://threatpost.com/en_us/blogs/wordpress-hit-second-massive-attack-two-days-030411,3/4/2011,Denial of Service,Insufficient Anti-automation,Downtime,Blogs,USA,No,,,,WordPress,,,,
-2011-51,WHID 2011-51: WordPress Hit by Second Massive Attack in Two Days,"The main WordPress.com site was the target of a major DDoS attack yesterday that knocked the popular blogging platform offline for a couple of hours, and another attack that hit the site again Friday morning. The service is back online now, but the attacks may be an indication that the service could be collateral damage in some politically motivated attacks against WordPress blogs.",http://threatpost.com/en_us/blogs/wordpress-hit-second-massive-attack-two-days-030411,3/4/2011,Denial of Service,Insufficient Anti-automation,Downtime,Blogs,USA,No,,,,WordPress,,,,
-2011-52,WHID 2011-52: S. Korea's major web sites hit by DDoS attacks,"SEOUL, March 4 (Xinhua) -- A fresh wave of cyber attacks hit major South Korean Web sites, including that of the presidential office Cheong Wa Dae, on Friday, local media reported, citing industrial sources.
-2011-53,WHID 2011-53: Expedia's TripAdvisor Member Data Stolen in Possible SQL Injection Attack,TripAdvisor discovered a data breach in its systems that allowed attackers to grab a portion of the Website's membership list from its database.,http://mobile.eweek.com/c/a/Security/Expedias-TripAdvisor-Member-Data-Stolen-in-Possible-SQL-Injection-Attack-522785/,3/24/2011,SQL Injection,Improper Input Handling,Leakage of Information,Hospitality,USA,No,,,,,,,,
-2011-53,WHID 2011-53: Expedia's TripAdvisor Member Data Stolen in Possible SQL Injection Attack,TripAdvisor discovered a data breach in its systems that allowed attackers to grab a portion of the Website's membership list from its database.,http://mobile.eweek.com/c/a/Security/Expedias-TripAdvisor-Member-Data-Stolen-in-Possible-SQL-Injection-Attack-522785/,3/24/2011,SQL Injection,Improper Input Handling,Leakage of Information,Hospitality,USA,No,,,,,,,,
-2011-53,WHID 2011-53: Thousands of home computers infiltrated after hackers infect high-profile websites with booby-trapped ads,"Tens of thousands of people are feared to have had their computers infected by booby-trapped adverts on websites including the London Stock Exchange as the full extent of a cyber-attack which began on Sunday becomes apparent.
-2011-54,WHID 2011-54: Internal Affairs website back online after outage,The Department of Internal Affairs website is now back up and running after it was shut down - only days before it was due to be hacked by international cyber activist group.,http://m.nzherald.co.nz/technology/news/article.php?c_id=5&objectid=10714882,3/25/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,New Zealand,No,,,,,,,,
-2011-54,WHID 2011-54: Internal Affairs website back online after outage,The Department of Internal Affairs website is now back up and running after it was shut down - only days before it was due to be hacked by international cyber activist group.,http://m.nzherald.co.nz/technology/news/article.php?c_id=5&objectid=10714882,3/25/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,New Zealand,No,,,,,,,,
-2011-55,WHID 2011-55: State website hacked - Officials say 1000 people affected have been notified,"Credit card information may have been stolen for some people who bought state park passes on line. The Maine Bureau of Parks and Lands learned in February that their online system for the sale of state park passes, provided by a private vendor, was hacked by ""malware.""",http://www.wabi.tv/news/18888/state-website-hacked-officials-say-1000-people-affected-have-been-notified,3/25/2011,Unknown,Unknown,Leakage of Information,Government,"Maine, USA",No,,,,,,,,
-2011-55,WHID 2011-55: State website hacked - Officials say 1000 people affected have been notified,"Credit card information may have been stolen for some people who bought state park passes on line. The Maine Bureau of Parks and Lands learned in February that their online system for the sale of state park passes, provided by a private vendor, was hacked by ""malware.""",http://www.wabi.tv/news/18888/state-website-hacked-officials-say-1000-people-affected-have-been-notified,3/25/2011,Unknown,Unknown,Leakage of Information,Government,"Maine, USA",No,,,,,,,,
-2011-56,WHID 2011-56: China accused of hacking Gmail to suppress dissent,"A few days ago, Google accused the government of China for the second time to have hacked into Gmail accounts in order to quash protest. Numerous problems of Chinese customers have been signalled over the past month for both sending and flagging messages.",http://www.htlounge.net/art/15053/china-accused-of-hacking-gmail-to-suppress-dissent.html,3/24/2011,Unknown,Insufficient Authentication,Session Hijacking,Service Providers,USA,No,,,China,GMail,,,,
-2011-56,WHID 2011-56: China accused of hacking Gmail to suppress dissent,"A few days ago, Google accused the government of China for the second time to have hacked into Gmail accounts in order to quash protest. Numerous problems of Chinese customers have been signalled over the past month for both sending and flagging messages.",http://www.htlounge.net/art/15053/china-accused-of-hacking-gmail-to-suppress-dissent.html,3/24/2011,Unknown,Insufficient Authentication,Session Hijacking,Service Providers,USA,No,,,China,GMail,,,,
-2011-57,WHID 2011-57: MySQL.com hacked via... SQL injection vuln,"MySQL.com was hacked over the weekend via an attack which used a blind SQL injection exploit to pull off the pawnage.
-2011-58,WHID 2011-58: Facebook XSS flaw misused for automatic Wall posting,"A currently unpatched XSS vulnerability in the mobile API version of Facebook is currently being exploited to post messages to users' Walls, which serve as a gateway to the specially crafted website exploiting the flaw.
-2011-59,WHID 2011-59: Oracle's Sun.com Hit Along with MySQL.com in SQL Injection Attack,"The hackers who compromised MySQL.com also targeted Sun.com with a SQL injection attack, exposing database names and email addresses.",http://www.eweek.com/c/a/Security/Oracles-Suncom-Hit-Along-with-MySQLCom-in-SQL-Injection-Attack-727118/,3/29/2011,SQL Injection,Improper Input Handling,Leakage of Information,Technology,USA,No,,,,,,,,
-2011-59,WHID 2011-59: Oracle's Sun.com Hit Along with MySQL.com in SQL Injection Attack,"The hackers who compromised MySQL.com also targeted Sun.com with a SQL injection attack, exposing database names and email addresses.",http://www.eweek.com/c/a/Security/Oracles-Suncom-Hit-Along-with-MySQLCom-in-SQL-Injection-Attack-727118/,3/29/2011,SQL Injection,Improper Input Handling,Leakage of Information,Technology,USA,No,,,,,,,,
-2011-5,WHID 2011-5: Dominos Pizza Hacked,Domimos Pizza's online ordering system in India was hacked.,http://www.slipperybrick.com/2011/01/dominos-pizza-website-hacked-customer-data-leaked/,1/23/2011,SQL Injection,Improper Input Handling,Leakage of Information,Retail,India,No,,,,,,,,
-2011-60,WHID 2011-60: Anonymous DDoS attack takes down Warner Bros Records: #OpPayBack,"The Internet hacktivist collective known as ""Anonymous"" successfully conducted a DDoS attack on Warner Bros Records, temporarily taking down the company website Tuesday afternoon (12:21 p.m. PST). In addition, several reports also indicate that the company's website was temporarily taken down Monday as well.",http://www.examiner.com/anonymous-in-national/anonymous-ddos-attack-takes-down-warner-bros-records-oppayback,3/29/2011,Denial of Service,Insufficient Anti-automation,Downtime,Media,USA,No,Operation Payback,,,,,,,
-2011-60,WHID 2011-60: Anonymous DDoS attack takes down Warner Bros Records: #OpPayBack,"The Internet hacktivist collective known as ""Anonymous"" successfully conducted a DDoS attack on Warner Bros Records, temporarily taking down the company website Tuesday afternoon (12:21 p.m. PST). In addition, several reports also indicate that the company's website was temporarily taken down Monday as well.",http://www.examiner.com/anonymous-in-national/anonymous-ddos-attack-takes-down-warner-bros-records-oppayback,3/29/2011,Denial of Service,Insufficient Anti-automation,Downtime,Media,USA,No,Operation Payback,,,,,,,
-2011-61,WHID 2011-61: LizaMoon Mass SQL Injection Attack Points to Rogue AV Site,"Attackers have launched a large-scale SQL injection attack that has compromised several thousand legitimate Websites, including a few catalog pages from Apple's iTunes music store.",http://www.eweek.com/c/a/Security/LizaMoon-Mass-SQL-Injection-Attack-Points-to-Rogue-AV-Site-852537/,3/29/2011,SQL Injection,Improper Input Handling,Planting of Malware,Multiple,,Yes,LizaMoon,,,,,,,
-2011-61,WHID 2011-61: LizaMoon Mass SQL Injection Attack Points to Rogue AV Site,"Attackers have launched a large-scale SQL injection attack that has compromised several thousand legitimate Websites, including a few catalog pages from Apple's iTunes music store.",http://www.eweek.com/c/a/Security/LizaMoon-Mass-SQL-Injection-Attack-Points-to-Rogue-AV-Site-852537/,3/29/2011,SQL Injection,Improper Input Handling,Planting of Malware,Multiple,,Yes,LizaMoon,,,,,,,
-2011-62,WHID 2011-62: Another Xbox Live director hacked!,"A hacker known as ???Predator??? has been able to phish information from Xbox Live???s Director of Policy and Enforcement, Stephen Toulouse (aka ???Stepto???), gaining email and address information via his personal website server and was then able to alter the Chief???s details online.",http://blog.gadgethelpline.com/xbox-live-director-hacked/,4/6/2011,Social Engineering,Insufficient Process Validation,Account Takeover,Entertainment,,No,,,,,,,,
-2011-62,WHID 2011-62: Another Xbox Live director hacked!,"A hacker known as ???Predator??? has been able to phish information from Xbox Live???s Director of Policy and Enforcement, Stephen Toulouse (aka ???Stepto???), gaining email and address information via his personal website server and was then able to alter the Chief???s details online.",http://blog.gadgethelpline.com/xbox-live-director-hacked/,4/6/2011,Social Engineering,Insufficient Process Validation,Account Takeover,Entertainment,,No,,,,,,,,
-2011-63,WHID 2011-63: LiveJournal under DDoS attack right now,"LiveJournal Russian blog platform again stopped working some 35-40 minutes ago. This is already the 3rd hack attack over the past two weeks.
-2011-64,WHID 2011-64: Facebook Bully Video Actually a XSS Exploit,A security researcher has identified a bully video as a malicious app exploiting yet another cross-site-scripting vulnerability on Facebook with a very sophisticated payload.,http://www.eweek.com/c/a/Security/Facebook-Bully-Video-Actually-a-XSS-Exploit-121829/,4/7/2011,Cross Site Request Forgery (CSRF),Insufficient Process Validation,Worm,Web 2.0,USA,No,,,,Facebook,,,,
-2011-64,WHID 2011-64: Facebook Bully Video Actually a XSS Exploit,A security researcher has identified a bully video as a malicious app exploiting yet another cross-site-scripting vulnerability on Facebook with a very sophisticated payload.,http://www.eweek.com/c/a/Security/Facebook-Bully-Video-Actually-a-XSS-Exploit-121829/,4/7/2011,Cross Site Request Forgery (CSRF),Insufficient Process Validation,Worm,Web 2.0,USA,No,,,,Facebook,,,,
-2011-65,WHID 2011-65: Sony sites offline after Anonymous attack threats,Several Sony Web sites were offline today only days after the Anonymous hacker group threatened to target the company over its lawsuit against PlayStation 3 hacker George Hotz.,http://news.cnet.com/8301-27080_3-20051482-245.html,4/6/2011,Denial of Service,Insufficient Anti-automation,Downtime,Entertainment,,No,,,,,,,,
-2011-65,WHID 2011-65: Sony sites offline after Anonymous attack threats,Several Sony Web sites were offline today only days after the Anonymous hacker group threatened to target the company over its lawsuit against PlayStation 3 hacker George Hotz.,http://news.cnet.com/8301-27080_3-20051482-245.html,4/6/2011,Denial of Service,Insufficient Anti-automation,Downtime,Entertainment,,No,,,,,,,,
-2011-66,WHID 2011-66: Epsilon Data Breach,"Epsilon--the largest distributor of permission-based email in the world--revealed that millions of individual email addresses were exposed in an attack on its servers. While no other information was apparently compromised, security experts are warning users to brace for a tidal wave of more precise spear phishing attacks.",http://www.pcworld.com/businesscenter/article/224192/epsilon_data_breach_expect_a_surge_in_spear_phishing_attacks.html,4/4/2011,SQL Injection,Improper Input Handling,Leakage of Information,Marketing,,No,,,,,,,,
-2011-66,WHID 2011-66: Epsilon Data Breach,"Epsilon--the largest distributor of permission-based email in the world--revealed that millions of individual email addresses were exposed in an attack on its servers. While no other information was apparently compromised, security experts are warning users to brace for a tidal wave of more precise spear phishing attacks.",http://www.pcworld.com/businesscenter/article/224192/epsilon_data_breach_expect_a_surge_in_spear_phishing_attacks.html,4/4/2011,SQL Injection,Improper Input Handling,Leakage of Information,Marketing,,No,,,,,,,,
-2011-67,WHID 2011-67: Hackers attack iTunes,"Hackers have taken control of the iTunes accounts of many users, using them to make fraudulent purchases.
-2011-68,WHID 2011-68: Hack attack spills web security firm's (Barracuda) confidential data,"Try this for irony: The website of web application security provider Barracuda Networks has sustained an attack that appears to have exposed sensitive data concerning the company's partners and employee login credentials, according to an anonymous post.
-2011-69,WHID 2011-69: Credit Information at Hyundai Capital Leaked to Hacker,Korea's major lending company and a financial unit of Hyundai Motor Group announced on Sunday that confidential credit information on its customers was leaked during a recent hacker attack which investigators say seems to have been carried out via servers in Brazil and the Philippines.,http://www.arirang.co.kr/News/News_View.asp?nseq=114741&code=Ne4&category=3,4/11/2011,SQL Injection,Improper Input Handling,Leakage of Information,Automotive,,No,,,Brazil,,,,,
-2011-69,WHID 2011-69: Credit Information at Hyundai Capital Leaked to Hacker,Korea's major lending company and a financial unit of Hyundai Motor Group announced on Sunday that confidential credit information on its customers was leaked during a recent hacker attack which investigators say seems to have been carried out via servers in Brazil and the Philippines.,http://www.arirang.co.kr/News/News_View.asp?nseq=114741&code=Ne4&category=3,4/11/2011,SQL Injection,Improper Input Handling,Leakage of Information,Automotive,,No,,,Brazil,,,,,
-2011-6,WHID 2011-6: Whirlpool ISP hit by DDoS attack,"User forum Whirlpool was hit by a distributed denial-of-service (DDoS) attack last night, according to the site's hosting provider BulletProof Networks.
-2011-70,WHID 2011-70: US Postal Service Website Hit With 'Blackhole' Exploit,"The US Postal Service website received an unwelcome delivery this week of a new attack rapidly spreading among legitimate websites. USPS became the latest victim of the so-called ""Blackhole"" toolkit, a wildly popular website attack kit that's easy to use and provides obfuscation features that help it evade antivirus detection.",http://www.darkreading.com/advanced-threats/167901091/security/attacks-breaches/229401258/us-postal-service-website-hit-with-blackhole-exploit.html,4/8/2011,Unknown,Improper Output Handling,Planting of Malware,Retail,"Cambridge, MA",No,,,,,,,,
-2011-70,WHID 2011-70: US Postal Service Website Hit With 'Blackhole' Exploit,"The US Postal Service website received an unwelcome delivery this week of a new attack rapidly spreading among legitimate websites. USPS became the latest victim of the so-called ""Blackhole"" toolkit, a wildly popular website attack kit that's easy to use and provides obfuscation features that help it evade antivirus detection.",http://www.darkreading.com/advanced-threats/167901091/security/attacks-breaches/229401258/us-postal-service-website-hit-with-blackhole-exploit.html,4/8/2011,Unknown,Improper Output Handling,Planting of Malware,Retail,"Cambridge, MA",No,,,,,,,,
-2011-71,WHID 2011-71: Malaysiakini under DDOS attack ahead of Sarawak election tomorrow,"Malaysian online news portal Malaysiakini has been inaccessible since late afternoon ahead of the Sarawak state election which will be held tomorrow.
-2011-72,WHID 2011-72: WordPress Hack Could Put Premium Users at Risk,"Malicious hackers have successfully breached WordPress.com servers and potentially made off with sensitive bits of the publishing platform's underlying code. The breach could impact premium customers using Wordpress for their websites, including Flickr, NASA, Yahoo, and The New York Times.",http://www.pcworld.com/article/225158/wordpress_hack_could_put_premium_users_at_risk.html,4/13/2011,Unknown,Unknown,Leakage of Information,Blogs,USA,No,,,,WordPress,,,,
-2011-72,WHID 2011-72: WordPress Hack Could Put Premium Users at Risk,"Malicious hackers have successfully breached WordPress.com servers and potentially made off with sensitive bits of the publishing platform's underlying code. The breach could impact premium customers using Wordpress for their websites, including Flickr, NASA, Yahoo, and The New York Times.",http://www.pcworld.com/article/225158/wordpress_hack_could_put_premium_users_at_risk.html,4/13/2011,Unknown,Unknown,Leakage of Information,Blogs,USA,No,,,,WordPress,,,,
-2011-73,WHID 2011-73: Royal Navy hacker claims to have broken into space agency site,"Login credentials for database, email and other key systems that a poster claims belong to the European Space Agency were posted on a full disclosure mailing list over the weekend.",http://www.eweekeurope.co.uk/news/european-space-agency-confirms-ftp-server-hack-26976,4/18/2011,SQL Injection,Improper Input Handling,Leakage of Information,Government,"San Jose, CA",No,,,,,,,,
-2011-73,WHID 2011-73: Royal Navy hacker claims to have broken into space agency site,"Login credentials for database, email and other key systems that a poster claims belong to the European Space Agency were posted on a full disclosure mailing list over the weekend.",http://www.eweekeurope.co.uk/news/european-space-agency-confirms-ftp-server-hack-26976,4/18/2011,SQL Injection,Improper Input Handling,Leakage of Information,Government,"San Jose, CA",No,,,,,,,,
-2011-74,WHID 2011-74: Wind Power Company Hacked,"In an email interview with the IDG News Service, Bigr R, said he was a former employee of NextEra's parent company, Florida Power & Light. He said he used a bug in the Cisco Security Device Manager software used by NextEra to break into the site. ""They gave to it public IP, so it was easy to hack into it through the Web,"" he said. ""They used default passwords, which I got from one of administrators. Then I obtained level 15 priv. (superuser), and understood the topology of SCADA networks. Then it was easily to detect SCADA and turn it off.""",http://www.computerworld.com/s/article/9215881/Wind_power_company_sees_no_evidence_of_reported_hack,4/18/2011,Brute Force,Insufficient Authentication,Leakage of Information,SCADA,"New Mexico, USA",No,,,,,,,,
-2011-74,WHID 2011-74: Wind Power Company Hacked,"In an email interview with the IDG News Service, Bigr R, said he was a former employee of NextEra's parent company, Florida Power & Light. He said he used a bug in the Cisco Security Device Manager software used by NextEra to break into the site. ""They gave to it public IP, so it was easy to hack into it through the Web,"" he said. ""They used default passwords, which I got from one of administrators. Then I obtained level 15 priv. (superuser), and understood the topology of SCADA networks. Then it was easily to detect SCADA and turn it off.""",http://www.computerworld.com/s/article/9215881/Wind_power_company_sees_no_evidence_of_reported_hack,4/18/2011,Brute Force,Insufficient Authentication,Leakage of Information,SCADA,"New Mexico, USA",No,,,,,,,,
-2011-75,WHID 2011-75: Manila Water's website hacked,"The website of water concessionaire Manila Water was hacked early Sunday, with visitors to the site seeing a small window indicating the breach.
-2011-76,WHID 2011-76: Auto Trader website attacked,"According to a story released on the Auto Trader blog page, the Auto Trader website was subject to an attack from midday on Apil 19th until the early hours of April 20th.
-2011-77,WHID 2011-77: Scottish news site hit by 'DDoS attack' in run-up to elections,"Politically-motivated hackers are thought to be behind a DDoS attack on alternative news site Newsnet Scotland, launched on Monday days before Scotland is due to vote in fiercely contested local elections.
-2011-78,"WHID 2011-78: The Children's Place, popular kid's clothing retailer, hit with database breach","The Children's Place Retail Stores Inc. said Tuesday that its customer email address database was recently accessed by an unauthorized third party. The database is stored at an external email service provider, according to company officials. The external service provider confirmed that only email addresses were accessed and no other personal information was obtained.",http://www.csoonline.com/article/679983/the-children-s-place-popular-kid-s-clothing-retailer-hit-with-database-breach,4/19/2011,Unknown,Unknown,Phishing,Retail,"Cambridge, MA",No,,,,,,,,
-2011-78,"WHID 2011-78: The Children's Place, popular kid's clothing retailer, hit with database breach","The Children's Place Retail Stores Inc. said Tuesday that its customer email address database was recently accessed by an unauthorized third party. The database is stored at an external email service provider, according to company officials. The external service provider confirmed that only email addresses were accessed and no other personal information was obtained.",http://www.csoonline.com/article/679983/the-children-s-place-popular-kid-s-clothing-retailer-hit-with-database-breach,4/19/2011,Unknown,Unknown,Phishing,Retail,"Cambridge, MA",No,,,,,,,,
-2011-79,WHID 2011-79: Change.org Victim of DDoS Attack From China,"Change.org, an online petitioning platform, has come under an ongoing distributed denial of service (DDoS) attack originating from China after the site hosted a call urging Chinese authorities to release artist Ai Weiwei from custody.","http://www.pcworld.com/printable/article/id,225672/printable.html",4/19/2011,Denial of Service,Insufficient Anti-automation,Downtime,Politics,,No,,,China,,,,,
-2011-79,WHID 2011-79: Change.org Victim of DDoS Attack From China,"Change.org, an online petitioning platform, has come under an ongoing distributed denial of service (DDoS) attack originating from China after the site hosted a call urging Chinese authorities to release artist Ai Weiwei from custody.","http://www.pcworld.com/printable/article/id,225672/printable.html",4/19/2011,Denial of Service,Insufficient Anti-automation,Downtime,Politics,,No,,,China,,,,,
-2011-7,WHID 2011-7: Hacker Breaks Into UConn Husky Store Website,"A hacker gained access to a database with the credit card information of 18,000 customers of the UConn Co-op's HuskyDirect.com website, the UConn Co-op said.","http://www.courant.com/business/hc-uconn-coop-data-breach-20110112,0,6878993.story",1/12/2011,SQL Injection,Improper Input Handling,Leakage of Information,Education,"Hartford, Connecticut",No,,,,,,,,
-2011-80,"WHID 2011-80: Ashampoo server hacked, customer names and e-mail addresses stolen","Rolf Hilchner, CEO of Ashampoo, has posted on the company???s website explaining exactly what has happened. Apparently hackers managed to break into one of Ashampoo???s servers that held customer data. There was a hole in their security and by using it Ashampoo customer names and e-mail addresses have been taken, but no payment and billing information was accessed.",http://www.geek.com/articles/geek-pick/ashampoo-server-hacked-customer-names-and-e-mail-addresses-stolen-20110421/,4/21/2011,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,No,,,,,,,,http://www.ashampoo.com/en/usd/dth
-2011-80,"WHID 2011-80: Ashampoo server hacked, customer names and e-mail addresses stolen","Rolf Hilchner, CEO of Ashampoo, has posted on the company???s website explaining exactly what has happened. Apparently hackers managed to break into one of Ashampoo???s servers that held customer data. There was a hole in their security and by using it Ashampoo customer names and e-mail addresses have been taken, but no payment and billing information was accessed.",http://www.geek.com/articles/geek-pick/ashampoo-server-hacked-customer-names-and-e-mail-addresses-stolen-20110421/,4/21/2011,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,No,,,,,,,,http://www.ashampoo.com/en/usd/dth
-2011-81,WHID 2011-81: AlArabiya.net Hacked??_Again,"Being one of the region???s leading news agencies, Al-Arabiya which is part of MBC Group, the largest broadcasting company in the Middle East has been hacked by an unknown group signed only with ???Crack_Man??? stating it has been ???powered morocco???.
-2011-82,WHID 2011-82: Sony fears Anonymous hack as PSN stays down,"It's looking more likely that loose-knit 'hacktivist' collective Anonymous may have pulled off the ""biggest ever"" attack on Sony's PlayStation network (PSN), as company engineers are investigating the possibility that the online gaming service has been hacked.",http://www.thinq.co.uk/2011/4/21/sony-fears-anonymous-hack-psn-stays-down/,4/21/2011,Denial of Service,Insufficient Anti-automation,Downtime,Entertainment,"Tokyo, Japan",No,,,,,,,,
-2011-82,WHID 2011-82: Sony fears Anonymous hack as PSN stays down,"It's looking more likely that loose-knit 'hacktivist' collective Anonymous may have pulled off the ""biggest ever"" attack on Sony's PlayStation network (PSN), as company engineers are investigating the possibility that the online gaming service has been hacked.",http://www.thinq.co.uk/2011/4/21/sony-fears-anonymous-hack-psn-stays-down/,4/21/2011,Denial of Service,Insufficient Anti-automation,Downtime,Entertainment,"Tokyo, Japan",No,,,,,,,,
-2011-83,WHID 2011-83: Minn. man accused of hacking Facebook accounts,"Prosecutors have accused a Minnesota man of hacking into other people's Facebook and other computer accounts and stealing photos of women to post on adult websites.
-2011-84,WHID 2011-84:Hackers access personal info of Lancaster County students,"LANCASTER, S.C. -- The Lancaster County School District says hackers may have stolen the personal information of 25,000 students in the district's database.
-2011-85,WHID 2011-85: IIM-B website hacked,"NEW DELHI: The website of the Indian Institute of Management-Bangalore has been hijacked by hackers peddling erectile dysfunction products like Viagra. The website, www.iimb.ernet.in, has been out of service for at least ten days.",http://timesofindia.indiatimes.com/tech/news/internet/IIM-B-website-hacked/articleshow/8080736.cms??prtpage=1,4/25/2011,Unknown,Improper Output Handling,Link Spam,Education,,No,,,,,,,,
-2011-85,WHID 2011-85: IIM-B website hacked,"NEW DELHI: The website of the Indian Institute of Management-Bangalore has been hijacked by hackers peddling erectile dysfunction products like Viagra. The website, www.iimb.ernet.in, has been out of service for at least ten days.",http://timesofindia.indiatimes.com/tech/news/internet/IIM-B-website-hacked/articleshow/8080736.cms??prtpage=1,4/25/2011,Unknown,Improper Output Handling,Link Spam,Education,,No,,,,,,,,
-2011-86,"WHID 2011-86: Cybercrime Extracts $399,000 from Florida Dentist???s Account","???Before the cybercriminals launched their TDoS attack, they found a way to obtain Dr. Thousand???s Ameritrade account information and password. Victims in these cases are often targeted through phishing attempts or by clicking an innocuous-looking email link that downloads malware to their system. In this manner, criminals are able to capture account details, passwords and other personal information. Once they have access to an account, they can then change the contact numbers and impersonate the victim when communicating with the bank or broker.???",http://www.prweb.com/releases/2011/4/prweb8338409.htm,4/25/2011,Banking Trojan,Insufficient Authentication,Monetary Loss,Online Trading,"Omaha, NE",No,,,USA,,,,,
-2011-86,"WHID 2011-86: Cybercrime Extracts $399,000 from Florida Dentist???s Account","???Before the cybercriminals launched their TDoS attack, they found a way to obtain Dr. Thousand???s Ameritrade account information and password. Victims in these cases are often targeted through phishing attempts or by clicking an innocuous-looking email link that downloads malware to their system. In this manner, criminals are able to capture account details, passwords and other personal information. Once they have access to an account, they can then change the contact numbers and impersonate the victim when communicating with the bank or broker.???",http://www.prweb.com/releases/2011/4/prweb8338409.htm,4/25/2011,Banking Trojan,Insufficient Authentication,Monetary Loss,Online Trading,"Omaha, NE",No,,,USA,,,,,
-2011-87,WHID 2011-87: PSN Admin Dev Accounts Got Hacked,"Sony???s PlayStation Network has been down since Wednesday and stayed kaput throughout the weekend. Sony has admitted that the outage was due to their network being hacked but has not given any further details. But now, a source closely connected with Sony Computer Entertainment Europe (SCEE) reports that the attack is much deeper than admitted by Sony. The source claims that the PSN sustained a LOIC attack (which created a denial-of-service attack) that damaged the server. Plus, it received concentrated attacks on the servers holding account information and breached the Admin Dev accounts.",http://www.slashgear.com/psn-admin-dev-accounts-got-hacked-source-claims-service-to-return-by-tuesday-24148081/,4/24/2011,Brute Force,Insufficient Anti-automation,Account Takeover,Entertainment,"Tokyo, Japan",No,,,,,,,,
-2011-87,WHID 2011-87: PSN Admin Dev Accounts Got Hacked,"Sony???s PlayStation Network has been down since Wednesday and stayed kaput throughout the weekend. Sony has admitted that the outage was due to their network being hacked but has not given any further details. But now, a source closely connected with Sony Computer Entertainment Europe (SCEE) reports that the attack is much deeper than admitted by Sony. The source claims that the PSN sustained a LOIC attack (which created a denial-of-service attack) that damaged the server. Plus, it received concentrated attacks on the servers holding account information and breached the Admin Dev accounts.",http://www.slashgear.com/psn-admin-dev-accounts-got-hacked-source-claims-service-to-return-by-tuesday-24148081/,4/24/2011,Brute Force,Insufficient Anti-automation,Account Takeover,Entertainment,"Tokyo, Japan",No,,,,,,,,
-2011-88,WHID 2011-88: Yahoo! PH Purple Hunt 2.0 Ad Compromised,"Earlier the other day, I was browsing through the Yahoo! PH site and the Yahoo! Purple Hunt 2.0 ad caught my attention. Curious, I clicked the ad and found my browser downloading a suspicious file named com.com.",http://blog.trendmicro.com/yahoo-ph-purple-hunt-2-0-ad-compromised/,4/24/2011,Malvertising,Improper Output Handling,Planting of Malware,Search Engine,USA,No,,,,,,,,
-2011-88,WHID 2011-88: Yahoo! PH Purple Hunt 2.0 Ad Compromised,"Earlier the other day, I was browsing through the Yahoo! PH site and the Yahoo! Purple Hunt 2.0 ad caught my attention. Curious, I clicked the ad and found my browser downloading a suspicious file named com.com.",http://blog.trendmicro.com/yahoo-ph-purple-hunt-2-0-ad-compromised/,4/24/2011,Malvertising,Improper Output Handling,Planting of Malware,Search Engine,USA,No,,,,,,,,
-2011-89,WHID 2011-89: China Implicated In Hacking Of SMB Online Bank Accounts,"This time it wasn't an ""advanced persistent threat"" that China was associated with: a fraud alert issued by the FBI today implicates China in a cybercrime operation that bilked U.S.-based small- to midsize businesses of $11 million over the past year.",http://www.informationweek.com/news/security/vulnerabilities/229402300,4/26/2011,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,,Yes,,20,China,,,,,http://www.ic3.gov/media/2011/ChinaWireTransferFraudAlert.pdf
-2011-89,WHID 2011-89: China Implicated In Hacking Of SMB Online Bank Accounts,"This time it wasn't an ""advanced persistent threat"" that China was associated with: a fraud alert issued by the FBI today implicates China in a cybercrime operation that bilked U.S.-based small- to midsize businesses of $11 million over the past year.",http://www.informationweek.com/news/security/vulnerabilities/229402300,4/26/2011,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,,Yes,,20,China,,,,,http://www.ic3.gov/media/2011/ChinaWireTransferFraudAlert.pdf
-2011-8,WHID 2011-8: Casino Gambler Databases Becoming A Key Tool For Hackers,"Players club points can be a valuable commodity when it comes to casinos, and hackers are now taking aim at player accounts. Several cases have been reported in Las Vegas of hackers getting into players club accounts and stealing the accumulated points.
-2011-90,WHID 2011-91: Anonymous takes down El Salvadoran sites,"Subscribers to ISP news and review site DSLReports.com have been notified that their e-mail addresses and passwords may have been exposed during an attack on the Web site earlier this week.
-2011-91,WHID 2011-91: Rabobank network floored by cyber attack,"Internet and mobile banking at the Rabobank has been badly hit by an attack on its computer network, the company reported on Monday. The denial of service attack, in which the target computer is saturated with external communications requests, has made the network unavailable to its customers.",http://www.dutchnews.nl/news/archives/2011/05/rabobank_network_floored_by_cy.php,5/2/2011,Denial of Service,Insufficient Anti-automation,Downtime,Finance,Netherlands,,,,,,,,,
-2011-91,WHID 2011-91: Rabobank network floored by cyber attack,"Internet and mobile banking at the Rabobank has been badly hit by an attack on its computer network, the company reported on Monday. The denial of service attack, in which the target computer is saturated with external communications requests, has made the network unavailable to its customers.",http://www.dutchnews.nl/news/archives/2011/05/rabobank_network_floored_by_cy.php,5/2/2011,Denial of Service,Insufficient Anti-automation,Downtime,Finance,Netherlands,,,,,,,,,
-2011-92,WHID 2011-92: Anonymous attacks Iranian state websites,"The infamous Anonymous hacking group has crippled a string of Iranian state websites including those of the Office of the Supreme Leader, state police and the Islamic Revolutionary Guards in attacks launched yesterday.","http://www.securecomputing.net.au/News/256057,anonymous-attacks-iranian-state-websites.aspx",5/2/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,Iran,,,,,,,,,
-2011-92,WHID 2011-92: Anonymous attacks Iranian state websites,"The infamous Anonymous hacking group has crippled a string of Iranian state websites including those of the Office of the Supreme Leader, state police and the Islamic Revolutionary Guards in attacks launched yesterday.","http://www.securecomputing.net.au/News/256057,anonymous-attacks-iranian-state-websites.aspx",5/2/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,Iran,,,,,,,,,
-2011-93,WHID 2011-93: Hacker posts screenshot of sex video on SPAD website,The Land Public Transport Commission (SPAD) website was hacked yesterday and a screenshot of the controversial sex video allegedly involving a top politician was posted on its main page.,http://thestar.com.my/news/story.asp?file=/2011/5/2/nation/8591951&sec=nation,5/2/2011,Unknown,Improper Output Handling,Defacement,Government,Malaysia,,,,,,,,,
-2011-93,WHID 2011-93: Hacker posts screenshot of sex video on SPAD website,The Land Public Transport Commission (SPAD) website was hacked yesterday and a screenshot of the controversial sex video allegedly involving a top politician was posted on its main page.,http://thestar.com.my/news/story.asp?file=/2011/5/2/nation/8591951&sec=nation,5/2/2011,Unknown,Improper Output Handling,Defacement,Government,Malaysia,,,,,,,,,
-2011-94,WHID 2011-94: High school hackers expose security gap in Seattle Public Schools,"District officials suspect a student, or several, swiped teachers' passwords for online grade books, possibly using a key-logger device or keystroke-recording software that captures every keystroke, including IDs and passwords",http://seattletimes.nwsource.com/html/editorials/2014914193_edit02grades.html,5/1/2011,Stolen Credentials,Insufficient Authentication,Disinformation,Education,"Seattle, WA",,,,,,,,,
-2011-94,WHID 2011-94: High school hackers expose security gap in Seattle Public Schools,"District officials suspect a student, or several, swiped teachers' passwords for online grade books, possibly using a key-logger device or keystroke-recording software that captures every keystroke, including IDs and passwords",http://seattletimes.nwsource.com/html/editorials/2014914193_edit02grades.html,5/1/2011,Stolen Credentials,Insufficient Authentication,Disinformation,Education,"Seattle, WA",,,,,,,,,
-2011-95,WHID 2011-95: Researchers Catch Targeted Attack On Popular Soccer Website,A popular sports website late last week was spotted serving up malware in what researchers say appears to be a targeted attack and not part of a mass SQL injection campaign.,http://www.darkreading.com/advanced-threats/167901091/security/application-security/229402594/researchers-catch-targeted-attack-on-popular-soccer-website.html,5/2/2011,Unknown,Improper Output Handling,Planting of Malware,Sports,Luxembourg,,,,,,,,,
-2011-95,WHID 2011-95: Researchers Catch Targeted Attack On Popular Soccer Website,A popular sports website late last week was spotted serving up malware in what researchers say appears to be a targeted attack and not part of a mass SQL injection campaign.,http://www.darkreading.com/advanced-threats/167901091/security/application-security/229402594/researchers-catch-targeted-attack-on-popular-soccer-website.html,5/2/2011,Unknown,Improper Output Handling,Planting of Malware,Sports,Luxembourg,,,,,,,,,
-2011-96,WHID 2011-96: Click-jacking on Facebook,WebSense analyzes a recent click-jacking attack against FaceBook users.,http://community.websense.com/blogs/securitylabs/archive/2011/05/02/a-weekend-of-click-jacking-on-facebook.aspx,5/2/2011,Clickjacking,Application Misconfiguration,Link Spam,Web 2.0,"Palo Alto, CA",,,,,,,,,
-2011-96,WHID 2011-96: Click-jacking on Facebook,WebSense analyzes a recent click-jacking attack against FaceBook users.,http://community.websense.com/blogs/securitylabs/archive/2011/05/02/a-weekend-of-click-jacking-on-facebook.aspx,5/2/2011,Clickjacking,Application Misconfiguration,Link Spam,Web 2.0,"Palo Alto, CA",,,,,,,,,
-2011-97,WHID 2011-97: Man who liveblogged Bin Laden raid was hacked,"The Pakistani programmer who dubbed himself ""the guy who liveblogged the Osama raid without knowing about it"" is also the guy who got his website hacked without knowing about it.",http://www.computerworld.com/s/article/9216341/Man_who_liveblogged_Bin_Laden_raid_was_hacked,5/2/2011,Unknown,Improper Output Handling,Planting of Malware,Blogs,"Berkeley, CA",,,,,,,,,
-2011-97,WHID 2011-97: Man who liveblogged Bin Laden raid was hacked,"The Pakistani programmer who dubbed himself ""the guy who liveblogged the Osama raid without knowing about it"" is also the guy who got his website hacked without knowing about it.",http://www.computerworld.com/s/article/9216341/Man_who_liveblogged_Bin_Laden_raid_was_hacked,5/2/2011,Unknown,Improper Output Handling,Planting of Malware,Blogs,"Berkeley, CA",,,,,,,,,
-2011-98,WHID 2011-98: Sony Darkens Another Network As Breach Investigation Widens,"Sony Corp. took further steps to contain a serious data breach: temporarily shuttering the Website of Sony Online Entertainment and station.com, another of the technology company's online gaming networks, even as it signaled the slow return of its PlayStation Network to operation.",http://threatpost.com/en_us/blogs/sony-darkens-another-network-breach-investigation-widens-050211,5/2/2011,Unknown,Unknown,Leakage of Information,Entertainment,"Tokyo, Japan",,,,,,,,,
-2011-98,WHID 2011-98: Sony Darkens Another Network As Breach Investigation Widens,"Sony Corp. took further steps to contain a serious data breach: temporarily shuttering the Website of Sony Online Entertainment and station.com, another of the technology company's online gaming networks, even as it signaled the slow return of its PlayStation Network to operation.",http://threatpost.com/en_us/blogs/sony-darkens-another-network-breach-investigation-widens-050211,5/2/2011,Unknown,Unknown,Leakage of Information,Entertainment,"Tokyo, Japan",,,,,,,,,
-2011-99,WHID 2011-99: FTC settles data breach charges against two firms,"In October and December 2009, an employee of a Lookout customer was able to gain access to the product's database by typing a URL into a Web browser, the FTC said in its complaint. The intruder was able to gain access to personal information, including Social Security numbers, of about 37,000 consumers, the FTC said.",http://news.idg.no/cw/art.cfm?id=2761F224-1A64-67EA-E41CDB96A756125A,10/1/2009,Predictable Resource Location,Insufficient Authorization,Leakage of Information,Information Services,"Palo Alto, CA",,,,,,,,,http://ftc.gov/os/caselist/1023076/110503lookoutservicesanal.pdf
-2011-99,WHID 2011-99: FTC settles data breach charges against two firms,"In October and December 2009, an employee of a Lookout customer was able to gain access to the product's database by typing a URL into a Web browser, the FTC said in its complaint. The intruder was able to gain access to personal information, including Social Security numbers, of about 37,000 consumers, the FTC said.",http://news.idg.no/cw/art.cfm?id=2761F224-1A64-67EA-E41CDB96A756125A,10/1/2009,Predictable Resource Location,Insufficient Authorization,Leakage of Information,Information Services,"Palo Alto, CA",,,,,,,,,http://ftc.gov/os/caselist/1023076/110503lookoutservicesanal.pdf
-2011-9,"WHID 2011-9: Hacker Attacked Runes of Magic Database, Holding Users' Info as Hostages","It's reported that a Runes of Magic player called 'augustus87' has hacked Frogster's database and threatened to release the data that contain over 3.5 million players' info to public, and even shut down the game's servers unless Frogster meet his demands.",http://news.mmosite.com/content/2011-01-18/hacker_attacked_runes_of_magic_database_holding_users_info_as_hostages.shtml,1/18/2011,SQL Injection,Improper Input Handling,Extortion,Entertainment,"Sacramento, CA",No,,,,,,,,
-2012-100,"WHID 2012-100: ICO fines travel firm ?150,000 after hacker steals card details from more than a million customers","This happened on 21 December 2012, when the hacker uncovered a coding error in the website and used an SQL injection to log in to the administrators? interface, the report explained.",http://www.v3.co.uk/v3-uk/news/2357033/ico-fines-travel-firm-gbp150-000-after-hacker-steals-over-a-million-card-details,12/21/2012,SQL Injection,Improper Input Handling,Leakage of Information,Travel,,,,,,,,,,
-2012-100,"WHID 2012-100: ICO fines travel firm ?150,000 after hacker steals card details from more than a million customers","This happened on 21 December 2012, when the hacker uncovered a coding error in the website and used an SQL injection to log in to the administrators? interface, the report explained.",http://www.v3.co.uk/v3-uk/news/2357033/ico-fines-travel-firm-gbp150-000-after-hacker-steals-over-a-million-card-details,12/21/2012,SQL Injection,Improper Input Handling,Leakage of Information,Travel,,,,,,,,,,
-2012-100,WHID 2012-100: Stockbrokers hit by cyber hack,The Australian Securities & Investment Commission has warned stockbrokers and shareholders of hacking events involving unauthorised online account access and tradin Read more: http://www.smh.com.au/it-pro/security-it/stockbrokers-hit-by-cyber-hack-20120123-1qdox.html#ixzz1sDCs9pqh,http://www.smh.com.au/it-pro/security-it/stockbrokers-hit-by-cyber-hack-20120123-1qdox.html,1/20/2012,Stolen Credentials,Insufficient Authentication,Monetary Loss,Finance,"Sydney, Australia",,,,,,,,,http://www.asic.gov.au/asic/asic.nsf/byHeadline/12-05AD%20Online%20trading%20account%20security%20breaches?opendocument
-2012-100,WHID 2012-100: Stockbrokers hit by cyber hack,The Australian Securities & Investment Commission has warned stockbrokers and shareholders of hacking events involving unauthorised online account access and tradin Read more: http://www.smh.com.au/it-pro/security-it/stockbrokers-hit-by-cyber-hack-20120123-1qdox.html#ixzz1sDCs9pqh,http://www.smh.com.au/it-pro/security-it/stockbrokers-hit-by-cyber-hack-20120123-1qdox.html,1/20/2012,Stolen Credentials,Insufficient Authentication,Monetary Loss,Finance,"Sydney, Australia",,,,,,,,,http://www.asic.gov.au/asic/asic.nsf/byHeadline/12-05AD%20Online%20trading%20account%20security%20breaches?opendocument
-2012-101,WHID 2012-101: CBS is offline and its servers are wiped,"Hackactivist outfit Anonymous has had a busy weekend and appears to have done a little more than its trademark denial-of-service attack against CBS. According to Gizmodo, Anonymous not only managed to take down the CBS.com website yesterday but it managed to wipe every file it found in its servers.",http://news.techeye.net/security/cbs-is-offline-and-its-servers-are-wiped#ixzz1sDE7V5ir,1/23/2012,DNS Hijacking,Unknown,Defacement,Entertainment,"New York, NY",,Anonymous,,,,,,,
-2012-101,WHID 2012-101: CBS is offline and its servers are wiped,"Hackactivist outfit Anonymous has had a busy weekend and appears to have done a little more than its trademark denial-of-service attack against CBS. According to Gizmodo, Anonymous not only managed to take down the CBS.com website yesterday but it managed to wipe every file it found in its servers.",http://news.techeye.net/security/cbs-is-offline-and-its-servers-are-wiped#ixzz1sDE7V5ir,1/23/2012,DNS Hijacking,Unknown,Defacement,Entertainment,"New York, NY",,Anonymous,,,,,,,
-2012-102,WHID 2012-102: Anonymous attacks Polish government websites,"Hackers' group Anonymous brought down several Polish government websites over the weekend, including the websites of the Sejm (Poland's lower house of parliament), the Prime Minister's Chancellery, the Ministry of Culture, the Ministry of Justice and the Internal Security Agency. Even the prime minster's daughter's blog was targeted.",http://www.wbj.pl/article-57691-anonymous-attacks-polish-government-websites.html?typ=wbj,1/23/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Warsaw, PL",Yes,Anonymous,,,,,,,
-2012-102,WHID 2012-102: Anonymous attacks Polish government websites,"Hackers' group Anonymous brought down several Polish government websites over the weekend, including the websites of the Sejm (Poland's lower house of parliament), the Prime Minister's Chancellery, the Ministry of Culture, the Ministry of Justice and the Internal Security Agency. Even the prime minster's daughter's blog was targeted.",http://www.wbj.pl/article-57691-anonymous-attacks-polish-government-websites.html?typ=wbj,1/23/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Warsaw, PL",Yes,Anonymous,,,,,,,
-2012-103,WHID 2012-103: 'The Daily Show' And 'Colbert Report' Twitter Accounts Hacked By Anonymous Sympathizers,"Late Sunday evening, both ""The Daily Show"" and ""The Colbert Report"" official Twitter accounts were hacked.",http://www.huffingtonpost.com/2012/01/23/the-daily-show-colbert-report-twitter-hacked_n_1223267.html,1/23/2012,Unknown,Unknown,Disinformation,Social,"San Francisco, CA",,,,,Twitter,,,,
-2012-103,WHID 2012-103: 'The Daily Show' And 'Colbert Report' Twitter Accounts Hacked By Anonymous Sympathizers,"Late Sunday evening, both ""The Daily Show"" and ""The Colbert Report"" official Twitter accounts were hacked.",http://www.huffingtonpost.com/2012/01/23/the-daily-show-colbert-report-twitter-hacked_n_1223267.html,1/23/2012,Unknown,Unknown,Disinformation,Social,"San Francisco, CA",,,,,Twitter,,,,
-2012-104,WHID 2012-104: How 103 Kenya govt sites were hacked,"We spoke about it last year, and this year, it has happened again. Yes, against every imaginable possibility, 103 government web sites were hacked by an individual calling himself Direxer.",http://www.nation.co.ke/Tech/How+103+govt+sites+were+hacked+/-/1017288/1312336/-/item/0/-/a8i6bj/-/index.html,1/22/2012,Brute Force,Insufficient Authentication,Defacement,Government,Kenya,,,,,,,,,
-2012-104,WHID 2012-104: How 103 Kenya govt sites were hacked,"We spoke about it last year, and this year, it has happened again. Yes, against every imaginable possibility, 103 government web sites were hacked by an individual calling himself Direxer.",http://www.nation.co.ke/Tech/How+103+govt+sites+were+hacked+/-/1017288/1312336/-/item/0/-/a8i6bj/-/index.html,1/22/2012,Brute Force,Insufficient Authentication,Defacement,Government,Kenya,,,,,,,,,
-2012-105,WHID 2012-105: Kevin Bacon - Kevin Bacon's Twitter Blog Hacked,Kevin Bacon has warned fans to beware of hoax Twitter.com posts advertising a weightloss product after his blog was targeted by hackers.,http://www.contactmusic.com/news/kevin-bacons-twitter-blog-hacked_1285736,1/22/2012,Unknown,Unknown,Spam,Social,"San Francisco, CA",,,,,Twitter,,,,
-2012-105,WHID 2012-105: Kevin Bacon - Kevin Bacon's Twitter Blog Hacked,Kevin Bacon has warned fans to beware of hoax Twitter.com posts advertising a weightloss product after his blog was targeted by hackers.,http://www.contactmusic.com/news/kevin-bacons-twitter-blog-hacked_1285736,1/22/2012,Unknown,Unknown,Spam,Social,"San Francisco, CA",,,,,Twitter,,,,
-2012-106,WHID 2012-106: Sen. Grassley???s Twitter Account Hacked by SOPA Protesters,"Republican Iowa Sen. Chuck Grassley???s twitter account was hacked today by the group ???Anonymous,??? protesting the anti-piracy bills being considered in Congress.",http://abcnews.go.com/blogs/politics/2012/01/sen-grassleys-twitter-account-hacked-by-sopa-protesters/,1/23/2012,Brute Force,Insufficient Authentication,Disinformation,Social,"San Francisco, CA",,,,,Twitter,,,,
-2012-106,WHID 2012-106: Sen. Grassley???s Twitter Account Hacked by SOPA Protesters,"Republican Iowa Sen. Chuck Grassley???s twitter account was hacked today by the group ???Anonymous,??? protesting the anti-piracy bills being considered in Congress.",http://abcnews.go.com/blogs/politics/2012/01/sen-grassleys-twitter-account-hacked-by-sopa-protesters/,1/23/2012,Brute Force,Insufficient Authentication,Disinformation,Social,"San Francisco, CA",,,,,Twitter,,,,
-2012-107,WHID 2012-107: Hackers immobilize websites of two Israeli hospitals,"Tel Aviv - Unknown hackers immobilized the websites of two Israeli hospitals Wednesday, after targeting them with denial of service attacks, the latest salvo in the cyber war between pro-Israelis and pro-Palestinians.",http://news.monstersandcritics.com/middleeast/news/article_1687401.php/LEAD-Hackers-immobilize-websites-of-two-Israeli-hospitals,1/25/2012,Denial of Service,Insufficient Anti-automation,Downtime,Healthcare,"Tel-Aviv, Israel",Yes,,,,,,,,
-2012-107,WHID 2012-107: Hackers immobilize websites of two Israeli hospitals,"Tel Aviv - Unknown hackers immobilized the websites of two Israeli hospitals Wednesday, after targeting them with denial of service attacks, the latest salvo in the cyber war between pro-Israelis and pro-Palestinians.",http://news.monstersandcritics.com/middleeast/news/article_1687401.php/LEAD-Hackers-immobilize-websites-of-two-Israeli-hospitals,1/25/2012,Denial of Service,Insufficient Anti-automation,Downtime,Healthcare,"Tel-Aviv, Israel",Yes,,,,,,,,
-2012-108,"WHID 2012-108: Facebook under Denial of Service Attack, confirms AnonSec","On the afternoon of January 25, 2012 around 5:30pm Pacific Time, the world's largest social network underwent a Denial of Service attack and service outages were reported in several countries.",http://www.fudzilla.com/home/item/25713-facebook-under-denial-of-service-attack-confirms-anonsec,1/26/2012,Denial of Service,Insufficient Anti-automation,Downtime,Social,"San Francisco, CA",Yes,Anonymous,,,Facebook,,,,
-2012-108,"WHID 2012-108: Facebook under Denial of Service Attack, confirms AnonSec","On the afternoon of January 25, 2012 around 5:30pm Pacific Time, the world's largest social network underwent a Denial of Service attack and service outages were reported in several countries.",http://www.fudzilla.com/home/item/25713-facebook-under-denial-of-service-attack-confirms-anonsec,1/26/2012,Denial of Service,Insufficient Anti-automation,Downtime,Social,"San Francisco, CA",Yes,Anonymous,,,Facebook,,,,
-2012-109,WHID 2012-109: Hackers crash Government websites,ONLINE hackers have shut down the websites of the two of the Government's biggest departments.,http://www.herald.ie/news/hackers-crash-government-websites-2999104.html,1/25/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Ireland,Yes,Anonymous,,,,,,,
-2012-109,WHID 2012-109: Hackers crash Government websites,ONLINE hackers have shut down the websites of the two of the Government's biggest departments.,http://www.herald.ie/news/hackers-crash-government-websites-2999104.html,1/25/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Ireland,Yes,Anonymous,,,,,,,
-2012-10,WHID 2012-10: Rancho Mirage city website hacked,"A hacker or hackers took over the front page of the city website, leaving a message that could be seen Tuesday supporting the Occupy movement and denouncing the proposed Stop Online Piracy Act.",http://www.mydesert.com/article/20120117/NEWS01/120117002/Rancho-Mirage-city-website-hacked,1/17/2012,Unknown,Unknown,Defacement,Government,California,Unknown,NA,1,Unknown,Unknown,Unknown,Unknown,,
-2012-110,WHID 2012-110: 'Anonymous' hackers target FTC,"Infamous hacking enclave Anonymous continued its quest for retribution Tuesday, claiming responsibility for shutting down OnGuardOnline.com, a Website managed by the U.S. Federal Trade Commission (FTC)",http://news.medill.northwestern.edu/chicago/news.aspx?id=199000,1/24/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Washington, DC",Yes,Anonymous,,,,,,,
-2012-110,WHID 2012-110: 'Anonymous' hackers target FTC,"Infamous hacking enclave Anonymous continued its quest for retribution Tuesday, claiming responsibility for shutting down OnGuardOnline.com, a Website managed by the U.S. Federal Trade Commission (FTC)",http://news.medill.northwestern.edu/chicago/news.aspx?id=199000,1/24/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Washington, DC",Yes,Anonymous,,,,,,,
-2012-111,"WHID 2012-111: Israeli Hacker Steals 85,000 Arabs' Facebook Logins","An Israeli hacker calling himself Hannibal stole and exposed the Facebook login credentials of 85,000 Arabs earlier this week. It's the latest retaliatory strike in a politically motivated battle between Israeli and Arab hackers that's been going strong since the beginning of the month.",http://www.msnbc.msn.com/id/46133351/ns/technology_and_science-security/#.T4w5lZpWrUU,1/25/2012,Unknown,Unknown,Leakage of Information,Social,"San Francisco, CA",,,,,,,,,
-2012-111,"WHID 2012-111: Israeli Hacker Steals 85,000 Arabs' Facebook Logins","An Israeli hacker calling himself Hannibal stole and exposed the Facebook login credentials of 85,000 Arabs earlier this week. It's the latest retaliatory strike in a politically motivated battle between Israeli and Arab hackers that's been going strong since the beginning of the month.",http://www.msnbc.msn.com/id/46133351/ns/technology_and_science-security/#.T4w5lZpWrUU,1/25/2012,Unknown,Unknown,Leakage of Information,Social,"San Francisco, CA",,,,,,,,,
-2012-112,WHID 2012-112: Lithuanian central bank hit by cyber-attack,"Lithuania's central bank said Friday it had been hit by a cyber-attack, but had eventually overcome the assault on its website and other online services.",http://www.google.com/hostednews/afp/article/ALeqM5ifPzsAaVafW485uqxHES1G5YjxgQ?docId=CNG.db52691d2005cab46bbe09fa2b685ee4.ee1,1/27/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,"Vilnius, Lithuania",Yes,,,,,,,,
-2012-112,WHID 2012-112: Lithuanian central bank hit by cyber-attack,"Lithuania's central bank said Friday it had been hit by a cyber-attack, but had eventually overcome the assault on its website and other online services.",http://www.google.com/hostednews/afp/article/ALeqM5ifPzsAaVafW485uqxHES1G5YjxgQ?docId=CNG.db52691d2005cab46bbe09fa2b685ee4.ee1,1/27/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,"Vilnius, Lithuania",Yes,,,,,,,,
-2012-113,"WHID 2012-113: Students busted for hacking computers, changing grades",Three high school juniors have been arrested after they devised a sophisticated hacking scheme to up their grades and make money selling quiz answers to their classmates.,http://www.theregister.co.uk/2012/01/27/students_hack_teachers_computers/,1/27/2012,Stolen Credentials,Insufficient Authentication,Fraud,Education,California,,,,,,,,,
-2012-113,"WHID 2012-113: Students busted for hacking computers, changing grades",Three high school juniors have been arrested after they devised a sophisticated hacking scheme to up their grades and make money selling quiz answers to their classmates.,http://www.theregister.co.uk/2012/01/27/students_hack_teachers_computers/,1/27/2012,Stolen Credentials,Insufficient Authentication,Fraud,Education,California,,,,,,,,,
-2012-114,WHID 2012-114: NLC???s website hacked,The official website of the Nigeria Labour Congress (NLC) came under attack yesterday from a group calling itself NaijaCyber Hacktivites. The hackers defaced the website and called two leaders of the union traitors for allegedly selling out to the Federal Government over the oil subsidy removal.,http://www.thenationonlineng.net/2011/index.php/news-update/34830-nlc%E2%80%99s-website-hacked.html,1/28/2012,Unknown,Unknown,Defacement,Government,Nigeria,,,,,,,,,
-2012-114,WHID 2012-114: NLC???s website hacked,The official website of the Nigeria Labour Congress (NLC) came under attack yesterday from a group calling itself NaijaCyber Hacktivites. The hackers defaced the website and called two leaders of the union traitors for allegedly selling out to the Federal Government over the oil subsidy removal.,http://www.thenationonlineng.net/2011/index.php/news-update/34830-nlc%E2%80%99s-website-hacked.html,1/28/2012,Unknown,Unknown,Defacement,Government,Nigeria,,,,,,,,,
-2012-115,WHID 2012-115: Forbes Exploited: XSS Vulnerabilities Allow Phishers to Hijack Sessions & Steal Logins Read more: Forbes Exploited: XSS Vulnerabilities Allow Phishers to Hijack Sessions & Steal Logins,"Here's another delicious Byte. Ucha Gobejishvili, a Georgian Security Researcher under the handle of longrifle0x, discovered two cross site scripting (XSS) vulnerabilities on the official website of Forbes. Read more: http://null-byte.wonderhowto.com/blog/forbes-exploited-xss-vulnerabilities-allow-phishers-hijack-sessions-steal-logins-0133051/#ixzz1sDnk6Vc7",http://null-byte.wonderhowto.com/blog/forbes-exploited-xss-vulnerabilities-allow-phishers-hijack-sessions-steal-logins-0133051/#ixzz1sDnUwuwm,1/27/2012,Cross-site Scripting (XSS),Improper Output Handling,Account Takeover,Media,US,,,,,,,,,
-2012-115,WHID 2012-115: Forbes Exploited: XSS Vulnerabilities Allow Phishers to Hijack Sessions & Steal Logins Read more: Forbes Exploited: XSS Vulnerabilities Allow Phishers to Hijack Sessions & Steal Logins,"Here's another delicious Byte. Ucha Gobejishvili, a Georgian Security Researcher under the handle of longrifle0x, discovered two cross site scripting (XSS) vulnerabilities on the official website of Forbes. Read more: http://null-byte.wonderhowto.com/blog/forbes-exploited-xss-vulnerabilities-allow-phishers-hijack-sessions-steal-logins-0133051/#ixzz1sDnk6Vc7",http://null-byte.wonderhowto.com/blog/forbes-exploited-xss-vulnerabilities-allow-phishers-hijack-sessions-steal-logins-0133051/#ixzz1sDnUwuwm,1/27/2012,Cross-site Scripting (XSS),Improper Output Handling,Account Takeover,Media,US,,,,,,,,,
-2012-116,"WHID 2012-116: Scalpers aggressively go after Bruce Springsteen tickets, disappoint fans","According to a statement from Ticketmaster, scalpers with ???sophisticated??? computer programs are to blame. Scalpers targeted the site with Distributed Denial of Service attacks, which generated extra junk traffic, resulting in the unresponsiveness of the site. Read more at http://www.inquisitr.com/187910/scalpers-aggressively-go-after-bruce-springsteen-tickets-disappoint-fans/#HYCdxfUHLpbzUS9E.99",http://www.inquisitr.com/187910/scalpers-aggressively-go-after-bruce-springsteen-tickets-disappoint-fans/#HYCdxfUHLpbzUS9E.99,1/29/2012,Denial of Service,Insufficient Anti-automation,Downtime,Retail,US,Yes,,,,,,,,
-2012-116,"WHID 2012-116: Scalpers aggressively go after Bruce Springsteen tickets, disappoint fans","According to a statement from Ticketmaster, scalpers with ???sophisticated??? computer programs are to blame. Scalpers targeted the site with Distributed Denial of Service attacks, which generated extra junk traffic, resulting in the unresponsiveness of the site. Read more at http://www.inquisitr.com/187910/scalpers-aggressively-go-after-bruce-springsteen-tickets-disappoint-fans/#HYCdxfUHLpbzUS9E.99",http://www.inquisitr.com/187910/scalpers-aggressively-go-after-bruce-springsteen-tickets-disappoint-fans/#HYCdxfUHLpbzUS9E.99,1/29/2012,Denial of Service,Insufficient Anti-automation,Downtime,Retail,US,Yes,,,,,,,,
-2012-117,WHID 2012-117: UFC president hacked after scrapping with Anonymous,"Dana White loves a good fight. But the Ultimate Fighting Championship president may have second thoughts about mixing it up with members of the hacker collective Anonymous on Thursday night on Twitter, where he was on the receiving end of a brutal punch.",http://www.cnn.com/2012/01/27/tech/web/ufc-anonymous-sopa/index.html,1/27/2012,Denial of Service,Insufficient Anti-automation,Downtime,Entertainment,US,Yes,Anonymous,,,,,,,
-2012-117,WHID 2012-117: UFC president hacked after scrapping with Anonymous,"Dana White loves a good fight. But the Ultimate Fighting Championship president may have second thoughts about mixing it up with members of the hacker collective Anonymous on Thursday night on Twitter, where he was on the receiving end of a brutal punch.",http://www.cnn.com/2012/01/27/tech/web/ufc-anonymous-sopa/index.html,1/27/2012,Denial of Service,Insufficient Anti-automation,Downtime,Entertainment,US,Yes,Anonymous,,,,,,,
-2012-118,WHID 2012-118: Universal Music Portugal database dumped by Hackers,"Another Latest Tip come in my Inbox today about the leak of Database of Universal Music Portugal's website. Hacker did not mention his name,or Codename, But he enumerate the Database and Extract it by Hacking the Site. 100's of Tables from Database and Users Data has been leaked via a pastebin File. It includes the Usernames, Passwords and Emails ID's of Users of Site.",http://thehackernews.com/2012/01/universal-music-portugal-database.html,1/29/2012,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,Portugal,,,,,,,,,
-2012-118,WHID 2012-118: Universal Music Portugal database dumped by Hackers,"Another Latest Tip come in my Inbox today about the leak of Database of Universal Music Portugal's website. Hacker did not mention his name,or Codename, But he enumerate the Database and Extract it by Hacking the Site. 100's of Tables from Database and Users Data has been leaked via a pastebin File. It includes the Usernames, Passwords and Emails ID's of Users of Site.",http://thehackernews.com/2012/01/universal-music-portugal-database.html,1/29/2012,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,Portugal,,,,,,,,,
-2012-119,WHID 2012-119: Hackers Attack Website of Brazil's Itau; May Try Other Banks,"Hackers from the Anonymous Movement group fought out a day-long attack against websites of Brazil's Banco Itau SA on Monday, shutting down service on several occasions, and threatened more action during the week.",http://online.wsj.com/article/SB10001424052970204652904577193920234068442.html,1/30/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,"Sao Paulo, Brazil",Yes,Anonymous,,,,,,,
-2012-119,WHID 2012-119: Hackers Attack Website of Brazil's Itau; May Try Other Banks,"Hackers from the Anonymous Movement group fought out a day-long attack against websites of Brazil's Banco Itau SA on Monday, shutting down service on several occasions, and threatened more action during the week.",http://online.wsj.com/article/SB10001424052970204652904577193920234068442.html,1/30/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,"Sao Paulo, Brazil",Yes,Anonymous,,,,,,,
-2012-11,WHID 2012-11: Mercier Bridge website hacked,With construction work shutting down the inbound lanes of the Mercier Bridge later today you may find yourself looking for information on the Mercier Bridge website.,http://www.cjad.com/CJADLocalNews/entry.aspx?BlogEntryID=10337095,1/19/2012,Unknown,Unknown,Defacement,Government,Canada,No,NA,1,Unknown,Unknown,Unknown,None,None,
-2012-120,WHID 2012-120: Hackers infect WordPress 3.2.1 blogs to distribute TDSS rootkit,"Hackers are compromising WordPress 3.2.1 blogs in order to infect their visitors with the notorious TDSS rootkit, according to researchers from Web security firm Websense.",http://www.techworld.com.au/article/413924/hackers_infect_wordpress_3_2_1_blogs_distribute_tdss_rootkit/?fp=16&fpid=1,2/1/2012,Unknown,Improper Output Handling,Planting of Malware,Blogs,Multiple,,,,,,,,,
-2012-120,WHID 2012-120: Hackers infect WordPress 3.2.1 blogs to distribute TDSS rootkit,"Hackers are compromising WordPress 3.2.1 blogs in order to infect their visitors with the notorious TDSS rootkit, according to researchers from Web security firm Websense.",http://www.techworld.com.au/article/413924/hackers_infect_wordpress_3_2_1_blogs_distribute_tdss_rootkit/?fp=16&fpid=1,2/1/2012,Unknown,Improper Output Handling,Planting of Malware,Blogs,Multiple,,,,,,,,,
-2012-121,WHID 2012-121: iTunes hackers are emptying accounts,"Emert isn???t alone. There is an ever-growing Apple support forum of people who have say their iTunes accounts have been hacked. It's been going on more than a year and now there are more than 65 pages in the forum with hundreds of replies. Most of them ask the same questions of Apple, wondering if they can get their money back. Emert was able to get a one-time refund.",http://www.abc2news.com/dpp/money/consumer/scam_alerts/itunes-hackers-are-emptying-accounts,1/30/2012,Unknown,Unknown,Monetary Loss,Retail,"Cupertino, CA",,,,,,,,,
-2012-121,WHID 2012-121: iTunes hackers are emptying accounts,"Emert isn???t alone. There is an ever-growing Apple support forum of people who have say their iTunes accounts have been hacked. It's been going on more than a year and now there are more than 65 pages in the forum with hundreds of replies. Most of them ask the same questions of Apple, wondering if they can get their money back. Emert was able to get a one-time refund.",http://www.abc2news.com/dpp/money/consumer/scam_alerts/itunes-hackers-are-emptying-accounts,1/30/2012,Unknown,Unknown,Monetary Loss,Retail,"Cupertino, CA",,,,,,,,,
-2012-122,WHID 2012-122: Fairfax microsites hacked,"Media giant Fairfax has confirmed that two of its microsites were hacked this month but claims that up to 10,000 unencrypted credit card details compromised in the same attack were not Fairfax customers.","http://www.scmagazine.com.au/News/288661,fairfax-microsites-hacked.aspx",2/1/2012,SQL Injection,Improper Input Handling,Leakage of Information,Media,Australia,,,,,,,,,
-2012-122,WHID 2012-122: Fairfax microsites hacked,"Media giant Fairfax has confirmed that two of its microsites were hacked this month but claims that up to 10,000 unencrypted credit card details compromised in the same attack were not Fairfax customers.","http://www.scmagazine.com.au/News/288661,fairfax-microsites-hacked.aspx",2/1/2012,SQL Injection,Improper Input Handling,Leakage of Information,Media,Australia,,,,,,,,,
-2012-123,WHID 2012-123: President's Website Comes Under Hacker Attack,"Ukrainian News Agency The President's website has come under hacker attack, the President's press secretary, Daria Chepak, writes in her blog at Ukrainska Pravda. ""Unknown persons have been attacking the official website of the President of Ukraine since today's night,"" she said.",http://un.ua/eng/article/373136.html,2/1/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Ukraine,Yes,,,,,,,,
-2012-123,WHID 2012-123: President's Website Comes Under Hacker Attack,"Ukrainian News Agency The President's website has come under hacker attack, the President's press secretary, Daria Chepak, writes in her blog at Ukrainska Pravda. ""Unknown persons have been attacking the official website of the President of Ukraine since today's night,"" she said.",http://un.ua/eng/article/373136.html,2/1/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Ukraine,Yes,,,,,,,,
-2012-124,WHID 2012-124: DHI website hacked thrice in a month,"With its website hacked thrice in the past month officials of Druk Holdings and Investments (DHI), a Nu 45 B company and the investment arm of the government, say the problem is partly because of lapses with Bhutan Telecom.",http://www.kuenselonline.com/2011/?p=26344,2/3/2012,Unknown,Unknown,Defacement,Finance,Bhutan,,,,,,,,,
-2012-124,WHID 2012-124: DHI website hacked thrice in a month,"With its website hacked thrice in the past month officials of Druk Holdings and Investments (DHI), a Nu 45 B company and the investment arm of the government, say the problem is partly because of lapses with Bhutan Telecom.",http://www.kuenselonline.com/2011/?p=26344,2/3/2012,Unknown,Unknown,Defacement,Finance,Bhutan,,,,,,,,,
-2012-125,WHID 2012-125: Hackers outwit online banking identity security systems,"Criminal hackers have found a way round the latest generation of online banking security devices given out by banks, the BBC has learned.",http://www.bbc.co.uk/news/technology-16812064,2/10/2012,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,UK,,,,,,,,,
-2012-125,WHID 2012-125: Hackers outwit online banking identity security systems,"Criminal hackers have found a way round the latest generation of online banking security devices given out by banks, the BBC has learned.",http://www.bbc.co.uk/news/technology-16812064,2/10/2012,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,UK,,,,,,,,,
-2012-126,WHID 2012-126: Daniel Negreanu???s PokerStars Account Hacked,"A computer hacker managed to compromise Daniel Negreanu???s PokerStars and e-mail accounts, sitting down at the virtual felt under the Canadian pro???s screen name and recklessly playing with Negreanu???s $100,000 in funds on account at the world???s top poker site.",http://www.pokernewsreport.com/daniel-negreanus-pokerstars-account-hacked-7299,2/3/2012,Unknown,Unknown,Monetary Loss,Entertainment,UK,,,,,,,,,
-2012-126,WHID 2012-126: Daniel Negreanu???s PokerStars Account Hacked,"A computer hacker managed to compromise Daniel Negreanu???s PokerStars and e-mail accounts, sitting down at the virtual felt under the Canadian pro???s screen name and recklessly playing with Negreanu???s $100,000 in funds on account at the world???s top poker site.",http://www.pokernewsreport.com/daniel-negreanus-pokerstars-account-hacked-7299,2/3/2012,Unknown,Unknown,Monetary Loss,Entertainment,UK,,,,,,,,,
-2012-127,WHID 2012-127: Hackers apparently hit Swedish government site,"A group linked to the hacker network Anonymous on Saturday said it had attacked the Swedish government's website, bringing it down for periods of time by overloading it with traffic. Read more: http://www.foxnews.com/scitech/2012/02/04/hackers-apparently-hit-swedish-government-site/#ixzz1sEEKo9es",http://www.foxnews.com/scitech/2012/02/04/hackers-apparently-hit-swedish-government-site/,2/4/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Stockholm, Sweden",Yes,Anonymous,,,,,,,
-2012-127,WHID 2012-127: Hackers apparently hit Swedish government site,"A group linked to the hacker network Anonymous on Saturday said it had attacked the Swedish government's website, bringing it down for periods of time by overloading it with traffic. Read more: http://www.foxnews.com/scitech/2012/02/04/hackers-apparently-hit-swedish-government-site/#ixzz1sEEKo9es",http://www.foxnews.com/scitech/2012/02/04/hackers-apparently-hit-swedish-government-site/,2/4/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Stockholm, Sweden",Yes,Anonymous,,,,,,,
-2012-128,WHID 2012-128: Department of Homeland Security website hacked by Anonymous,"Only hours after two of its biggest releases ever, the online collective Anonymous is taking credit for crashing the website of the US Department of Homeland Security.",https://rt.com/usa/news/homeland-security-website-anonymous-473/,2/4/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Washington, DC",Yes,Anonymous,,,,,,,
-2012-128,WHID 2012-128: Department of Homeland Security website hacked by Anonymous,"Only hours after two of its biggest releases ever, the online collective Anonymous is taking credit for crashing the website of the US Department of Homeland Security.",https://rt.com/usa/news/homeland-security-website-anonymous-473/,2/4/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Washington, DC",Yes,Anonymous,,,,,,,
-2012-129,WHID 2012-129: Hackers block Slovenian largest bank NLB's website,"Online hackers' group Anonymous blocked temporarily on Saturday the website of Slovenia's largest bank NLB, while thousands protested in Ljubljana against an anti-piracy pact.",http://www.google.com/hostednews/afp/article/ALeqM5ilturtoKhGM1fSlrXKtodx5KAysw?docId=CNG.e27edd710da10fc1025f9684e4b281b4.471,2/4/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,Slovenia,Yes,Anonymous,,,,,,,
-2012-129,WHID 2012-129: Hackers block Slovenian largest bank NLB's website,"Online hackers' group Anonymous blocked temporarily on Saturday the website of Slovenia's largest bank NLB, while thousands protested in Ljubljana against an anti-piracy pact.",http://www.google.com/hostednews/afp/article/ALeqM5ilturtoKhGM1fSlrXKtodx5KAysw?docId=CNG.e27edd710da10fc1025f9684e4b281b4.471,2/4/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,Slovenia,Yes,Anonymous,,,,,,,
-2012-12,WHID 2012-12: Anonymous takedown FBI as Megaupload Shutdown retaliation,"After FBI Federal agents executed a shutdown on the files sharing website Megaupload on Thursday, the response of Internet comes rapidly from none other than Anonymous.",http://www.nationalturk.com/en/anonymous-takedown-fbi-as-megaupload-shutdown-retaliation-16006,1/20/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,United States,Yes,Distributed Denial of Service,6+,United States,Unknown,Unknown,None,NA,
-2012-130,WHID 2012-130: Citigroup Inc. (NYSE:C) Hit By Hackers,"Hackers have attacked Brazilian financial websites, including Citigroup Inc. (NYSE:C). Citigroup Inc. (NYSE:C) Hit By Hackers Citigroup, Inc. 34.35 +0.94 (+2.81%) Intraday 3 Month 6 Month 1 Year A group of Brazilian hackers named ???Anonymous Brazil??? have attacked a series of financial websites in Brazil, including Citigroup Inc. (NYSE:C), Febraban, Banco BMG and other institutions.",http://www.emoneydaily.com/citigroup-inc-nysec-hit-by-hackers/69823284/,2/6/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,Brazil,Yes,Anonymous,,,,,,,
-2012-130,WHID 2012-130: Citigroup Inc. (NYSE:C) Hit By Hackers,"Hackers have attacked Brazilian financial websites, including Citigroup Inc. (NYSE:C). Citigroup Inc. (NYSE:C) Hit By Hackers Citigroup, Inc. 34.35 +0.94 (+2.81%) Intraday 3 Month 6 Month 1 Year A group of Brazilian hackers named ???Anonymous Brazil??? have attacked a series of financial websites in Brazil, including Citigroup Inc. (NYSE:C), Febraban, Banco BMG and other institutions.",http://www.emoneydaily.com/citigroup-inc-nysec-hit-by-hackers/69823284/,2/6/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,Brazil,Yes,Anonymous,,,,,,,
-2012-131,WHID 2012-131: United Russia Site Attacked by Hacker Group Anonymous,A United Russia party website was knocked offline Thursday after hackers from the group Anonymous claimed to have directed a denial of service attack on the site.,http://www.themoscowtimes.com/news/article/united-russia-site-attacked-by-hacker-group-anonymous/452761.html,2/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Moscow, Russia",Yes,Anonymous,,,,,,,
-2012-131,WHID 2012-131: United Russia Site Attacked by Hacker Group Anonymous,A United Russia party website was knocked offline Thursday after hackers from the group Anonymous claimed to have directed a denial of service attack on the site.,http://www.themoscowtimes.com/news/article/united-russia-site-attacked-by-hacker-group-anonymous/452761.html,2/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Moscow, Russia",Yes,Anonymous,,,,,,,
-2012-132,WHID 2012-132: Israel Today hacked; Israeli army jumps into cyber war,"Over the past few days, an unknown hacker or group of hackers pounded the israeltoday.co.il domain with so many requests that it repeatedly crashed.",http://israeltoday.co.il/News/tabid/178/nid/23111/language/en-US/Default.aspx,2/9/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,Israel,Yes,,,,,,,,
-2012-132,WHID 2012-132: Israel Today hacked; Israeli army jumps into cyber war,"Over the past few days, an unknown hacker or group of hackers pounded the israeltoday.co.il domain with so many requests that it repeatedly crashed.",http://israeltoday.co.il/News/tabid/178/nid/23111/language/en-US/Default.aspx,2/9/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,Israel,Yes,,,,,,,,
-2012-133,WHID 2012-133: TeamPoison Hackers Hit the United Nations,"Following on from the OpNigeria assault, a hacker operating under TeamPoison's banner has targeted the United Nations (UN), releasing the data stolen in a statement posted on Pastebin.",http://www.ibtimes.co.uk/articles/295795/20120209/teampoison-hack-hackers-united-nations-un-cali.htm#ixzz1sEVVtO8X,2/9/2012,SQL Injection,Improper Input Handling,Leakage of Information,Government,US,,,,,,,,,
-2012-133,WHID 2012-133: TeamPoison Hackers Hit the United Nations,"Following on from the OpNigeria assault, a hacker operating under TeamPoison's banner has targeted the United Nations (UN), releasing the data stolen in a statement posted on Pastebin.",http://www.ibtimes.co.uk/articles/295795/20120209/teampoison-hack-hackers-united-nations-un-cali.htm#ixzz1sEVVtO8X,2/9/2012,SQL Injection,Improper Input Handling,Leakage of Information,Government,US,,,,,,,,,
-2012-134,WHID 2012-134: Hackers Claims to compromise Intel's Sensitive Data,"A security researcher under the name of ""WeedGrower"", or ""X-pOSed"" has been on a roll since the start of 2012. He has ambushed huge sites such as AOL, NASA, Hotmail, Myspace, Xbox, USBank, Yahoo, and VISA, he has also leaked sensitive data on most of those websites.",http://thehackernews.com/2012/02/hackers-claims-to-compromise-intels.html,2/10/2012,SQL Injection,Improper Input Handling,Leakage of Information,Technology,US,,,,,,,,,
-2012-134,WHID 2012-134: Hackers Claims to compromise Intel's Sensitive Data,"A security researcher under the name of ""WeedGrower"", or ""X-pOSed"" has been on a roll since the start of 2012. He has ambushed huge sites such as AOL, NASA, Hotmail, Myspace, Xbox, USBank, Yahoo, and VISA, he has also leaked sensitive data on most of those websites.",http://thehackernews.com/2012/02/hackers-claims-to-compromise-intels.html,2/10/2012,SQL Injection,Improper Input Handling,Leakage of Information,Technology,US,,,,,,,,,
-2012-135,WHID 2012-135: Anonymous attacks Croatian presidency website,Hacking collective Anonymous launched on February 9 a distributed denial of service (DDOS) attack on the website of the Croatian presidency after incumbent Ivo Josipovic defended the Anti-Counterfeiting Treaty Agreement (ACTA).,http://www.sofiaecho.com/2012/02/10/1764013_anonymous-attacks-croatian-presidency-website,2/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Croatia,Yes,Anonymous,,,,,,,
-2012-135,WHID 2012-135: Anonymous attacks Croatian presidency website,Hacking collective Anonymous launched on February 9 a distributed denial of service (DDOS) attack on the website of the Croatian presidency after incumbent Ivo Josipovic defended the Anti-Counterfeiting Treaty Agreement (ACTA).,http://www.sofiaecho.com/2012/02/10/1764013_anonymous-attacks-croatian-presidency-website,2/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Croatia,Yes,Anonymous,,,,,,,
-2012-135,WHID 2012-135: Hacker says porn site users compromised,"A hacker claims to have compromised the personal information of more than 350,000 users after breaking into a disused website operated by pornography provider Brazzers.",http://www.usatoday.com/news/nation/story/2012-02-11/hackers-anonymous-brazzers-porn/53048096/1,2/11/2012,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,Luxembourg,,,,,,,,,
-2012-135,WHID 2012-135: Hacker says porn site users compromised,"A hacker claims to have compromised the personal information of more than 350,000 users after breaking into a disused website operated by pornography provider Brazzers.",http://www.usatoday.com/news/nation/story/2012-02-11/hackers-anonymous-brazzers-porn/53048096/1,2/11/2012,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,Luxembourg,,,,,,,,,
-2012-136,"WHID 2012-136: 700,000 kroner stolen in NemID attack",Hackers used spy software to help them steal money from the online bank accounts of eight individuals by bypassing the NemID digital signature,http://www.cphpost.dk/news/national/700000-kroner-stolen-nemid-attack,2/12/2012,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,Copenhagen,,,,,,,,,
-2012-136,"WHID 2012-136: 700,000 kroner stolen in NemID attack",Hackers used spy software to help them steal money from the online bank accounts of eight individuals by bypassing the NemID digital signature,http://www.cphpost.dk/news/national/700000-kroner-stolen-nemid-attack,2/12/2012,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,Copenhagen,,,,,,,,,
-2012-137,WHID 2012-137: Hackers Target Thai Government Over Censorship Allegations,"The attack saw the two hackers target a Thai government website, defacing several of its pages. The defacements made contained an air of humour, with one of the more prominent changes making the site list Hax.r00t as the country's president and Saadi as its Prime Minister. Read more: http://www.ibtimes.co.uk/articles/298390/20120214/hackers-thai-government-censorship-online-saadi-hax.htm#ixzz1sFNCqQG0",http://www.ibtimes.co.uk/articles/298390/20120214/hackers-thai-government-censorship-online-saadi-hax.htm,2/14/2012,Unknown,Unknown,Defacement,Government,Thailand,,,,,,,,,
-2012-137,WHID 2012-137: Hackers Target Thai Government Over Censorship Allegations,"The attack saw the two hackers target a Thai government website, defacing several of its pages. The defacements made contained an air of humour, with one of the more prominent changes making the site list Hax.r00t as the country's president and Saadi as its Prime Minister. Read more: http://www.ibtimes.co.uk/articles/298390/20120214/hackers-thai-government-censorship-online-saadi-hax.htm#ixzz1sFNCqQG0",http://www.ibtimes.co.uk/articles/298390/20120214/hackers-thai-government-censorship-online-saadi-hax.htm,2/14/2012,Unknown,Unknown,Defacement,Government,Thailand,,,,,,,,,
-2012-138,WHID 2012-138: Breaches galore as Cryptome hacked to infect visitors with malware,"A breach that caused Cryptome.org to infect visitors with virulent malware was one of at least six attacks reported to hit high-profile sites or services in the past few days. Others affected included Ticketmaster, websites for Mexico and the state of Alabama, Dutch ISP KPN, and the Microsoft store in India.",http://arstechnica.com/business/news/2012/02/breaches-galore-as-cryptome-hacked-to-infect-visitors-with-malware.ars,2/14/2012,Unknown,Improper Output Handling,Planting of Malware,Media,US,,,,,,,,,
-2012-138,WHID 2012-138: Breaches galore as Cryptome hacked to infect visitors with malware,"A breach that caused Cryptome.org to infect visitors with virulent malware was one of at least six attacks reported to hit high-profile sites or services in the past few days. Others affected included Ticketmaster, websites for Mexico and the state of Alabama, Dutch ISP KPN, and the Microsoft store in India.",http://arstechnica.com/business/news/2012/02/breaches-galore-as-cryptome-hacked-to-infect-visitors-with-malware.ars,2/14/2012,Unknown,Improper Output Handling,Planting of Malware,Media,US,,,,,,,,,
-2012-139,WHID 2012-139: Nasdaq Web Site Shut Down By Denial Of Service Attacks,"Nasdaq.com is down for the count at the moment, apparently felled by a distributed denial-of-service attack from a group of hackers possibly connected with Anonymous, the hacking collective.",http://www.forbes.com/sites/ericsavitz/2012/02/14/nasdaq-web-site-shut-down-by-denial-of-service-attacks/,2/14/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,US,,,,,,,,,
-2012-139,WHID 2012-139: Nasdaq Web Site Shut Down By Denial Of Service Attacks,"Nasdaq.com is down for the count at the moment, apparently felled by a distributed denial-of-service attack from a group of hackers possibly connected with Anonymous, the hacking collective.",http://www.forbes.com/sites/ericsavitz/2012/02/14/nasdaq-web-site-shut-down-by-denial-of-service-attacks/,2/14/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,US,,,,,,,,,
-2012-13,WHID 2012-13: MMA notes: UFC website hacked,A criminal investigation is underway after UFC.com was hacked Sunday.,http://www.torontosun.com/2012/01/25/mma-notes-ufc-website-hacked,1/25/2012,DNS Hijacking,Unknown,Defacement,Entertainment,"Las Vegas, NV",No,NA,1,Unknown,Unknown,,,,
-2012-13,WHID 2012-13: MMA notes: UFC website hacked,A criminal investigation is underway after UFC.com was hacked Sunday.,http://www.torontosun.com/2012/01/25/mma-notes-ufc-website-hacked,1/25/2012,DNS Hijacking,Unknown,Defacement,Entertainment,"Las Vegas, NV",No,NA,1,Unknown,Unknown,,,,
-2012-140,WHID 2012-140: Anonymous Hacked BTK Database,"The group got hold of four different databases of the BTK and published the according information on Twitter. Information about companies like Vodafone, TurkNet, Superonline, Avea or Turkcell was published encrypted. Data from the fourth database contained clear information on the full names of BTK employees, their user names, e-mails, passwords, mobile, home and office phone numbers, date of birth and their ID numbers.",http://www.bianet.org/english/world/136178-anonymous-hacked-btk-database,2/15/2012,SQL Injection,Improper Input Handling,Leakage of Information,Government,Istanbul,,,,,,,,,
-2012-140,WHID 2012-140: Anonymous Hacked BTK Database,"The group got hold of four different databases of the BTK and published the according information on Twitter. Information about companies like Vodafone, TurkNet, Superonline, Avea or Turkcell was published encrypted. Data from the fourth database contained clear information on the full names of BTK employees, their user names, e-mails, passwords, mobile, home and office phone numbers, date of birth and their ID numbers.",http://www.bianet.org/english/world/136178-anonymous-hacked-btk-database,2/15/2012,SQL Injection,Improper Input Handling,Leakage of Information,Government,Istanbul,,,,,,,,,
-2012-141,WHID 2012-141: Hackers siphon Penticton man???s bank account,"A Penticton man is issuing a warning after $3,000 was drained from his bank account.",http://www.pentictonwesternnews.com/news/139300688.html,2/14/2012,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,"Penticton, B.C.",,,,,,,,,
-2012-141,WHID 2012-141: Hackers siphon Penticton man???s bank account,"A Penticton man is issuing a warning after $3,000 was drained from his bank account.",http://www.pentictonwesternnews.com/news/139300688.html,2/14/2012,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,"Penticton, B.C.",,,,,,,,,
-2012-142,WHID 2012-142: East African firms caught up in hacking spree,"A number of sites in East Africa were hacked starting last week by multiple hackers, in what appears to be an uncordinated hacking spree .The hacks come just after an overnight hack involving 103 Government of Kenya websites by an Indonesian hacker. This include the website of MTN, the largest mobile operator in Rwanda and a major player across the continent.",http://news.idg.no/cw/art.cfm?id=10D8AA4C-9644-9A7D-E93200E945A6E32B,2/15/2012,SQL Injection,Improper Input Handling,Leakage of Information,Retail,Africa,,,,,,,,,
-2012-142,WHID 2012-142: East African firms caught up in hacking spree,"A number of sites in East Africa were hacked starting last week by multiple hackers, in what appears to be an uncordinated hacking spree .The hacks come just after an overnight hack involving 103 Government of Kenya websites by an Indonesian hacker. This include the website of MTN, the largest mobile operator in Rwanda and a major player across the continent.",http://news.idg.no/cw/art.cfm?id=10D8AA4C-9644-9A7D-E93200E945A6E32B,2/15/2012,SQL Injection,Improper Input Handling,Leakage of Information,Retail,Africa,,,,,,,,,
-2012-143,WHID 2012-143: FTC sites hacked by Anonymous,The hacking group known as Anonymous has claimed a new series of hacks against the U.S. Federal Trade Commission and consumer rights websites.,http://www.usatoday.com/tech/news/story/2012-02-17/ftc-sites-hacked-anonymous/53128914/1,2/17/2012,Unknown,Unknown,Defacement,Government,US,,,,,,,,,
-2012-143,WHID 2012-143: FTC sites hacked by Anonymous,The hacking group known as Anonymous has claimed a new series of hacks against the U.S. Federal Trade Commission and consumer rights websites.,http://www.usatoday.com/tech/news/story/2012-02-17/ftc-sites-hacked-anonymous/53128914/1,2/17/2012,Unknown,Unknown,Defacement,Government,US,,,,,,,,,
-2012-144,WHID 2012-144: Hackers hit Los Angeles police canine group,"A group of hacktivists has leaked the names, addresses, phone numbers and email passwords of more than 100 police officers stolen from the database of the Los Angeles County Police Canine Association (LACPCA) website.",http://www.msnbc.msn.com/id/46480682/ns/technology_and_science-security/#.T419t5pWrUU,2/22/2012,Unknown,Unknown,Leakage of Information,Law Enforcement,"Los Angeles, California",,,,,,,,,
-2012-144,WHID 2012-144: Hackers hit Los Angeles police canine group,"A group of hacktivists has leaked the names, addresses, phone numbers and email passwords of more than 100 police officers stolen from the database of the Los Angeles County Police Canine Association (LACPCA) website.",http://www.msnbc.msn.com/id/46480682/ns/technology_and_science-security/#.T419t5pWrUU,2/22/2012,Unknown,Unknown,Leakage of Information,Law Enforcement,"Los Angeles, California",,,,,,,,,
-2012-145,WHID 2012-145: Newark city website attacked by hacker group,"For the second time this month, the group CabinCr3w ??? an affiliate of the pro-free speech hackers Anonymous ??? is taking credit for infiltrating the city of Newark???s website and protesting corruption and police brutality, according to several city officials and statements by the group itself.",http://www.nj.com/news/index.ssf/2012/02/newark_city_website_attacked_b.html,2/22/2012,Unknown,Unknown,Defacement,Government,"Newark, NJ",,,,,,,,,
-2012-145,WHID 2012-145: Newark city website attacked by hacker group,"For the second time this month, the group CabinCr3w ??? an affiliate of the pro-free speech hackers Anonymous ??? is taking credit for infiltrating the city of Newark???s website and protesting corruption and police brutality, according to several city officials and statements by the group itself.",http://www.nj.com/news/index.ssf/2012/02/newark_city_website_attacked_b.html,2/22/2012,Unknown,Unknown,Defacement,Government,"Newark, NJ",,,,,,,,,
-2012-146,WHID 2012-146: Nagoya zoo website hacked to display messages on Nanjing Massacre: media,"The website of a Nagoya city-run zoo was hacked Thursday and displayed messages saying that the massacre of civilians of eastern China's Nanjing City by Japanese soldiers in 1937 should be acknowledged, according to local media citing the city of Nagoya as saying.",http://www.shanghaidaily.com/article/article_xinhua.asp?id=52830,2/23/2012,Unknown,Unknown,Defacement,Government,"Nagoya, Japan",,,,,,,,,
-2012-146,WHID 2012-146: Nagoya zoo website hacked to display messages on Nanjing Massacre: media,"The website of a Nagoya city-run zoo was hacked Thursday and displayed messages saying that the massacre of civilians of eastern China's Nanjing City by Japanese soldiers in 1937 should be acknowledged, according to local media citing the city of Nagoya as saying.",http://www.shanghaidaily.com/article/article_xinhua.asp?id=52830,2/23/2012,Unknown,Unknown,Defacement,Government,"Nagoya, Japan",,,,,,,,,
-2012-147,"WHID 2012-147: Azerbaijani TV, AZAL websites hacked by Iranians","Iranian hackers attacked the websites of the Azerbaijan State Television & Radio Company, AzTV, and Azerbaijani Airlines (AZAL) on 22-23 February.",http://www.news.az/articles/tech/55220,2/23/2012,Unknown,Unknown,Defacement,Media,Azerbaijan,,,,,,,,,
-2012-147,"WHID 2012-147: Azerbaijani TV, AZAL websites hacked by Iranians","Iranian hackers attacked the websites of the Azerbaijan State Television & Radio Company, AzTV, and Azerbaijani Airlines (AZAL) on 22-23 February.",http://www.news.az/articles/tech/55220,2/23/2012,Unknown,Unknown,Defacement,Media,Azerbaijan,,,,,,,,,
-2012-148,"WHID 2012-148: Hackers Target Sony Australia, Hit Reseller Instead","The local domain sonyvaio.com.au has been hacked and a defacement page posted claiming credit for the attack. A Malaysian-based group bragged on a since-removed Facebook post, ???W00t SONY VAIO Australia hacked.??? However, Gizmodo AU checked whois records and found the domain actually belongs to TX Computer Solutions, an authorised Sony reseller.",http://www.gizmodo.com.au/2012/02/hackers-target-sony-australia-hit-reseller-instead/,2/23/2012,Unknown,Unknown,Defacement,Retail,Australia,,,,,,,,,
-2012-148,"WHID 2012-148: Hackers Target Sony Australia, Hit Reseller Instead","The local domain sonyvaio.com.au has been hacked and a defacement page posted claiming credit for the attack. A Malaysian-based group bragged on a since-removed Facebook post, ???W00t SONY VAIO Australia hacked.??? However, Gizmodo AU checked whois records and found the domain actually belongs to TX Computer Solutions, an authorised Sony reseller.",http://www.gizmodo.com.au/2012/02/hackers-target-sony-australia-hit-reseller-instead/,2/23/2012,Unknown,Unknown,Defacement,Retail,Australia,,,,,,,,,
-2012-149,WHID 2012-149: Twilight author's website found hosting malware,"For a time, fans of the ""Twilight"" saga who regularly visit the official website of the series' writer Stephenie Meyer may be in for a real-life horror story. Meyer's website (www.stepheniemeyer.com) had been found to host ""Crimepack,"" an exploit kit that installs malware on Windows PCs, security firm GFI labs reported.",http://www.gmanetwork.com/news/story/249301/scitech/technology/twilight-author-s-website-found-hosting-malware,2/24/2012,Unknown,Improper Output Handling,Planting of Malware,Media,US,,,,,,,,,
-2012-149,WHID 2012-149: Twilight author's website found hosting malware,"For a time, fans of the ""Twilight"" saga who regularly visit the official website of the series' writer Stephenie Meyer may be in for a real-life horror story. Meyer's website (www.stepheniemeyer.com) had been found to host ""Crimepack,"" an exploit kit that installs malware on Windows PCs, security firm GFI labs reported.",http://www.gmanetwork.com/news/story/249301/scitech/technology/twilight-author-s-website-found-hosting-malware,2/24/2012,Unknown,Improper Output Handling,Planting of Malware,Media,US,,,,,,,,,
-2012-14,WHID 2012-15: Hackers Take Down Irish Gov't Websites to Protest Anti-Piracy Bill,Anonymous Sweden has claimed responsibility on Twitter for the over-night shutdown of two Irish government websites. The hacking was used in protest of new copyright legislation that is being considered by Ireland.,http://www.irishcentral.com/news/Hacker-group-Anonymous-forces-Irish-government-sites-offline-over-Internet-privacy-act-138115538.html,1/25/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Ireland,Yes,DDoS,2,Unknown,Unknown,,None,None,
-2012-14,WHID 2012-15: Hackers Take Down Irish Gov't Websites to Protest Anti-Piracy Bill,Anonymous Sweden has claimed responsibility on Twitter for the over-night shutdown of two Irish government websites. The hacking was used in protest of new copyright legislation that is being considered by Ireland.,http://www.irishcentral.com/news/Hacker-group-Anonymous-forces-Irish-government-sites-offline-over-Internet-privacy-act-138115538.html,1/25/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Ireland,Yes,DDoS,2,Unknown,Unknown,,None,None,
-2012-150,WHID 2012-150: Dayton FBI partner website hacked,A Dayton-based partner organization to the FBI had its website vandalized Friday by hackers who claimed to be allied to the loose-knit Anonymous movement.,http://www.daytondailynews.com/news/dayton-news/dayton-fbi-partner-website-hacked-1333986.html,2/24/2012,Unknown,Unknown,Defacement,Law Enforcement,"Dayton, OH",,,,,,,,,
-2012-150,WHID 2012-150: Dayton FBI partner website hacked,A Dayton-based partner organization to the FBI had its website vandalized Friday by hackers who claimed to be allied to the loose-knit Anonymous movement.,http://www.daytondailynews.com/news/dayton-news/dayton-fbi-partner-website-hacked-1333986.html,2/24/2012,Unknown,Unknown,Defacement,Law Enforcement,"Dayton, OH",,,,,,,,,
-2012-151,WHID 2012-151: Hackers attack Ontario police chiefs' website,Anonymous -- the hacker group affiliated with a string of cyber attacks against corporations and law enforcement agencies -- has apparently added the Ontario Association of Chiefs of Police to its hit list.,http://ottawa.ctv.ca/servlet/an/local/CTVNews/20120225/ontario-chiefs-of-police-website-hacked-120225/20120225/?hub=OttawaHome,2/25/2012,Unknown,Unknown,Defacement,Law Enforcement,"Ontario, Canada",,,,,,,,,
-2012-151,WHID 2012-151: Hackers attack Ontario police chiefs' website,Anonymous -- the hacker group affiliated with a string of cyber attacks against corporations and law enforcement agencies -- has apparently added the Ontario Association of Chiefs of Police to its hit list.,http://ottawa.ctv.ca/servlet/an/local/CTVNews/20120225/ontario-chiefs-of-police-website-hacked-120225/20120225/?hub=OttawaHome,2/25/2012,Unknown,Unknown,Defacement,Law Enforcement,"Ontario, Canada",,,,,,,,,
-2012-152,WHID 2012-152: Uznews.net server comes under DDoS attack,The website of the Uznews.net independent news service has come under a Distributed Denial of Service (DDoS) attack which has rendered the site temporarily inaccessible.,http://www.uznews.net/news_single.php?lng=en&sub=top&cid=3&nid=19245,3/2/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,US,,,,,,,,,
-2012-152,WHID 2012-152: Uznews.net server comes under DDoS attack,The website of the Uznews.net independent news service has come under a Distributed Denial of Service (DDoS) attack which has rendered the site temporarily inaccessible.,http://www.uznews.net/news_single.php?lng=en&sub=top&cid=3&nid=19245,3/2/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,US,,,,,,,,,
-2012-153,WHID 2012-153: Bug in Plesk administration software is being actively exploited,"A critical security vulnerability in the Plesk administration program is currently being actively used to compromise affected servers. Plesk is used most often by hosting providers and provides a web front-end for administering rented servers. The vulnerability seems to be a SQL injection problem, which an attacker can exploit to gain full administrative access to a system.",http://www.h-online.com/security/news/item/Bug-in-Plesk-administration-software-is-being-actively-exploited-1446587.html,3/1/2012,SQL Injection,Improper Input Handling,Leakage of Information,Multiple,Multiple,,,,,,,,,
-2012-153,WHID 2012-153: Bug in Plesk administration software is being actively exploited,"A critical security vulnerability in the Plesk administration program is currently being actively used to compromise affected servers. Plesk is used most often by hosting providers and provides a web front-end for administering rented servers. The vulnerability seems to be a SQL injection problem, which an attacker can exploit to gain full administrative access to a system.",http://www.h-online.com/security/news/item/Bug-in-Plesk-administration-software-is-being-actively-exploited-1446587.html,3/1/2012,SQL Injection,Improper Input Handling,Leakage of Information,Multiple,Multiple,,,,,,,,,
-2012-154,WHID 2012-154: Linode hackers escape with $70K in daring bitcoin heist,"Popular web host Linode has been hacked by cyber-thieves who made off with a stash of bitcoins worth $71,000 (??44,736) in real money.",http://www.theregister.co.uk/2012/03/02/linode_bitcoin_heist/,3/2/2012,Brute Force,Insufficient Anti-automation,Monetary Loss,Finance,"Nobby Beach, AU",,,,,,,,,
-2012-154,WHID 2012-154: Linode hackers escape with $70K in daring bitcoin heist,"Popular web host Linode has been hacked by cyber-thieves who made off with a stash of bitcoins worth $71,000 (??44,736) in real money.",http://www.theregister.co.uk/2012/03/02/linode_bitcoin_heist/,3/2/2012,Brute Force,Insufficient Anti-automation,Monetary Loss,Finance,"Nobby Beach, AU",,,,,,,,,
-2012-155,WHID 2012-155: Hackers Elect Futurama???s Bender to the Washington DC School Board,"Electronic voting has earned a pretty bad reputation for being insecure and completely unreliable. Well, get ready to add another entry to e-voting's list of woes.",https://www.pcworld.com/article/251187/hackers_elect_futuramas_bender_to_the_washington_dc_school_board.html,3/2/2012,Code Injection,Improper Input Handling,Fraud,Education,"Washington, DC",,,,,,,,,
-2012-155,WHID 2012-155: Hackers Elect Futurama???s Bender to the Washington DC School Board,"Electronic voting has earned a pretty bad reputation for being insecure and completely unreliable. Well, get ready to add another entry to e-voting's list of woes.",https://www.pcworld.com/article/251187/hackers_elect_futuramas_bender_to_the_washington_dc_school_board.html,3/2/2012,Code Injection,Improper Input Handling,Fraud,Education,"Washington, DC",,,,,,,,,
-2012-156,WHID 2012-156: How GitHub handled getting hacked,"Here is the story of how GitHub was hacked, and how the company reacted to the event. The first response was very poor, but thankfully the second one was a significant improvement.",https://www.zdnet.com/blog/security/how-github-handled-getting-hacked/10473,3/4/2012,Mass Assignment,Insufficient Authorization,Account Takeover,Technology,"San Francisco, CA",,,,,Ruby on Rails,,,,
-2012-156,WHID 2012-156: How GitHub handled getting hacked,"Here is the story of how GitHub was hacked, and how the company reacted to the event. The first response was very poor, but thankfully the second one was a significant improvement.",https://www.zdnet.com/blog/security/how-github-handled-getting-hacked/10473,3/4/2012,Mass Assignment,Insufficient Authorization,Account Takeover,Technology,"San Francisco, CA",,,,,Ruby on Rails,,,,
-2012-157,WHID 2012-157: Sony Says Michael Jackson Recordings Were Stolen From Its Site,"This could be bad for Sony, in many senses of the word: that media giant has confirmed that several tracks recorded by Michael Jackson were stolen from its Web site after it was hacked",http://artsbeat.blogs.nytimes.com/2012/03/05/sony-says-michael-jackson-recordings-were-stolen-from-its-site/,3/5/2012,Unknown,Unknown,Leakage of Information,Entertainment,Japan,,,,,,,,,
-2012-157,WHID 2012-157: Sony Says Michael Jackson Recordings Were Stolen From Its Site,"This could be bad for Sony, in many senses of the word: that media giant has confirmed that several tracks recorded by Michael Jackson were stolen from its Web site after it was hacked",http://artsbeat.blogs.nytimes.com/2012/03/05/sony-says-michael-jackson-recordings-were-stolen-from-its-site/,3/5/2012,Unknown,Unknown,Leakage of Information,Entertainment,Japan,,,,,,,,,
-2012-158,"WHID 2012-158: Allphones hacked, staff passwords exposed","Telecommunications retailer Allphones has had hundreds of staff usernames, passwords and company administrator logins exposed following a hacking attack. The breach occurred when the company's web administration interface was accessed through a SQL injection attack that targeted the Allphones website.","http://www.scmagazine.com.au/News/292592,allphones-hacked-staff-passwords-exposed.aspx",3/6/2012,SQL Injection,Improper Input Handling,Leakage of Information,Retail,Australia,,,,,,,,,
-2012-158,"WHID 2012-158: Allphones hacked, staff passwords exposed","Telecommunications retailer Allphones has had hundreds of staff usernames, passwords and company administrator logins exposed following a hacking attack. The breach occurred when the company's web administration interface was accessed through a SQL injection attack that targeted the Allphones website.","http://www.scmagazine.com.au/News/292592,allphones-hacked-staff-passwords-exposed.aspx",3/6/2012,SQL Injection,Improper Input Handling,Leakage of Information,Retail,Australia,,,,,,,,,
-2012-159,WHID 2012-159: Facebook Goes Down Temporarily in Parts of Europe,"Facebook was down temporarily in parts of Europe on Wednesday, with users in some countries outside the region also reporting problems. CERT.be, the federal cyberemergency team for Belgium, said Facebook was hit by a DDOS (distributed denial of service) attack.",https://www.pcworld.com/article/251420/facebook_goes_down_temporarily_in_parts_of_europe.html,3/7/2012,Denial of Service,Insufficient Anti-automation,Downtime,Social,US,,,,,,,,,
-2012-159,WHID 2012-159: Facebook Goes Down Temporarily in Parts of Europe,"Facebook was down temporarily in parts of Europe on Wednesday, with users in some countries outside the region also reporting problems. CERT.be, the federal cyberemergency team for Belgium, said Facebook was hit by a DDOS (distributed denial of service) attack.",https://www.pcworld.com/article/251420/facebook_goes_down_temporarily_in_parts_of_europe.html,3/7/2012,Denial of Service,Insufficient Anti-automation,Downtime,Social,US,,,,,,,,,
-2012-15,WHID 2012-15: Hackers Take Down Mexico Gov't Websites to Protest Anti-Piracy Bill,"Hackers thought to be part of the Anonymous organization attacked and took down the web sites of Mexico's interior department and Senate, officials in both government bodies said.",http://latino.foxnews.com/latino/news/2012/01/28/hackers-take-down-mexico-govt-websites-to-protest-anti-piracy-bill/,1/27/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Mexico,Yes,Denial of Service,1,Unknown,Unknown,,,,
-2012-15,WHID 2012-15: Hackers Take Down Mexico Gov't Websites to Protest Anti-Piracy Bill,"Hackers thought to be part of the Anonymous organization attacked and took down the web sites of Mexico's interior department and Senate, officials in both government bodies said.",http://latino.foxnews.com/latino/news/2012/01/28/hackers-take-down-mexico-govt-websites-to-protest-anti-piracy-bill/,1/27/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Mexico,Yes,Denial of Service,1,Unknown,Unknown,,,,
-2012-160,WHID 2012-160: Turkish police website hacked with password '123456',"Internet security phail: for a group of Turkish hackers, breaking into the Ankara Police Department's website and stealing secret data was as simple as 123...456.",http://www.gmanetwork.com/news/story/250626/scitech/technology/turkish-police-website-hacked-with-password-123456,3/7/2012,Brute Force,Insufficient Anti-automation,Leakage of Information,Law Enforcement,Turkey,,,,,,,,,
-2012-160,WHID 2012-160: Turkish police website hacked with password '123456',"Internet security phail: for a group of Turkish hackers, breaking into the Ankara Police Department's website and stealing secret data was as simple as 123...456.",http://www.gmanetwork.com/news/story/250626/scitech/technology/turkish-police-website-hacked-with-password-123456,3/7/2012,Brute Force,Insufficient Anti-automation,Leakage of Information,Law Enforcement,Turkey,,,,,,,,,
-2012-161,WHID 2012-161: Rogue Antivirus Campaign Targets WordPress,"A new wave of mass-injections of a fake antivirus campaign that appears to be targeting sites hosted by popular blogging platform WordPress, according to Websense it has detected",http://www.techweekeurope.co.uk/news/rogue-antivirus-campaign-targets-wordpress-65755,3/8/2012,Unknown,Improper Output Handling,Planting of Malware,Blogs,Multiple,Yes,,,,,,,,
-2012-161,WHID 2012-161: Rogue Antivirus Campaign Targets WordPress,"A new wave of mass-injections of a fake antivirus campaign that appears to be targeting sites hosted by popular blogging platform WordPress, according to Websense it has detected",http://www.techweekeurope.co.uk/news/rogue-antivirus-campaign-targets-wordpress-65755,3/8/2012,Unknown,Improper Output Handling,Planting of Malware,Blogs,Multiple,Yes,,,,,,,,
-2012-162,"WHID 2012-162: Porn site Digital Playground hacked, hackers say ???too enticing to resist???","Yet another porn site was hacked this week, losing 73,000 e-mail addresses, user names, and passwords, and some 40,000 plain-text credit card numbers, including CCV numbers and expiration dates, according to SC Magazine.",http://www.scmagazine.com/porn-site-digital-playground-hacked-to-expose-card-numbers/article/231472/,3/9/2012,Unknown,Unknown,Leakage of Information,Entertainment,Luxembourg,,,,,,,,,
-2012-162,"WHID 2012-162: Porn site Digital Playground hacked, hackers say ???too enticing to resist???","Yet another porn site was hacked this week, losing 73,000 e-mail addresses, user names, and passwords, and some 40,000 plain-text credit card numbers, including CCV numbers and expiration dates, according to SC Magazine.",http://www.scmagazine.com/porn-site-digital-playground-hacked-to-expose-card-numbers/article/231472/,3/9/2012,Unknown,Unknown,Leakage of Information,Entertainment,Luxembourg,,,,,,,,,
-2012-163,WHID 2012-163: Anonymous hacks Vatican again,The hacktivist group Anonymous has taken down the Vatican???s website for a second time. The attack is part of the organization???s recent declaration of war against religion.,https://www.zdnet.com/blog/security/anonymous-hacks-vatican-again/10721,3/12/2012,Backdoor,Unknown,Defacement,Religious,"Rome, Italy",,,,,,,,,
-2012-163,WHID 2012-163: Anonymous hacks Vatican again,The hacktivist group Anonymous has taken down the Vatican???s website for a second time. The attack is part of the organization???s recent declaration of war against religion.,https://www.zdnet.com/blog/security/anonymous-hacks-vatican-again/10721,3/12/2012,Backdoor,Unknown,Defacement,Religious,"Rome, Italy",,,,,,,,,
-2012-164,WHID 2012-164: Anonymous Attacks Vatican For Third Time in One Week,"It???s been a hard past week for the Vatican???s online presence. Since members of Anonymous declared war on religion last Monday, and as a part of the latest retaliatory cyber attacks following the indictment of several suspected hackers, Vatican servers have been targeted at least three times. First they took down the Vatican homepage, then they broke into a Vatican Radio Server, and now Anonymous-affiliated hacker Agent_Anon is claiming a DDoS of related site catholic.va, with a corresponding database dump on pastebin.",http://www.webpronews.com/anonymous-attacks-vatican-for-third-time-in-one-week-2012-03,3/13/2012,Denial of Service,Insufficient Anti-automation,Downtime,Religious,"Rome, Italy",Yes,Anonymous,,,,,,,
-2012-164,WHID 2012-164: Anonymous Attacks Vatican For Third Time in One Week,"It???s been a hard past week for the Vatican???s online presence. Since members of Anonymous declared war on religion last Monday, and as a part of the latest retaliatory cyber attacks following the indictment of several suspected hackers, Vatican servers have been targeted at least three times. First they took down the Vatican homepage, then they broke into a Vatican Radio Server, and now Anonymous-affiliated hacker Agent_Anon is claiming a DDoS of related site catholic.va, with a corresponding database dump on pastebin.",http://www.webpronews.com/anonymous-attacks-vatican-for-third-time-in-one-week-2012-03,3/13/2012,Denial of Service,Insufficient Anti-automation,Downtime,Religious,"Rome, Italy",Yes,Anonymous,,,,,,,
-2012-165,"WHID 2012-165: BBC hit with cyberattack, Iran link suspected","Hackers attacked the BBC earlier this month, leaving some parts of the organization without access to e-mail and Internet services, the BBC has confirmed.",http://www.washingtonpost.com/business/technology/bbc-hit-with-cyberattack-iran-link-suspected/2012/03/14/gIQAvnL4BS_story.html,3/14/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,UK,Yes,Anonymous,,,,,,,
-2012-165,"WHID 2012-165: BBC hit with cyberattack, Iran link suspected","Hackers attacked the BBC earlier this month, leaving some parts of the organization without access to e-mail and Internet services, the BBC has confirmed.",http://www.washingtonpost.com/business/technology/bbc-hit-with-cyberattack-iran-link-suspected/2012/03/14/gIQAvnL4BS_story.html,3/14/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,UK,Yes,Anonymous,,,,,,,
-2012-166,WHID 2012-166: Hackers expose Ancestry.com security bug,A security bug may exist on Ancestry.com that could leave the personal information of its registered users exposed and vulnerable to theft.,http://www.msnbc.msn.com/id/46735808/ns/technology_and_science-security/#.T422QppWrUU,3/14/2012,SQL Injection,Improper Input Handling,Leakage of Information,Information,"Provo, UT",,,,,,,,,
-2012-166,WHID 2012-166: Hackers expose Ancestry.com security bug,A security bug may exist on Ancestry.com that could leave the personal information of its registered users exposed and vulnerable to theft.,http://www.msnbc.msn.com/id/46735808/ns/technology_and_science-security/#.T422QppWrUU,3/14/2012,SQL Injection,Improper Input Handling,Leakage of Information,Information,"Provo, UT",,,,,,,,,
-2012-167,WHID 2012-167: Hackers hit 112 Indian gov sites in three months,"There was embarrassing news for the Indian government this week as one of its ministers was forced to admit that over 100 of its web sites had been hacked in just three months at the beginning of the year, including that of a state-owned telecoms company.",http://www.theregister.co.uk/2012/03/16/indian_government_sites_hacked/,3/16/2012,Unknown,Unknown,Defacement,Government,India,,,,,,,,,
-2012-167,WHID 2012-167: Hackers hit 112 Indian gov sites in three months,"There was embarrassing news for the Indian government this week as one of its ministers was forced to admit that over 100 of its web sites had been hacked in just three months at the beginning of the year, including that of a state-owned telecoms company.",http://www.theregister.co.uk/2012/03/16/indian_government_sites_hacked/,3/16/2012,Unknown,Unknown,Defacement,Government,India,,,,,,,,,
-2012-168,WHID 2012-168: Doc outrage: Anonymous 'behind' web-siege on Russian TV channel,The Russian faction of Anonymous has claimed responsibility for a cyber-attack on a Russian TV station's website. The outage follows a controversial documentary about Russian protestors produced by NTV.,https://rt.com/news/tv-station-site-attacked-922/,3/20/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,Russia,,,,,,,,,
-2012-168,WHID 2012-168: Doc outrage: Anonymous 'behind' web-siege on Russian TV channel,The Russian faction of Anonymous has claimed responsibility for a cyber-attack on a Russian TV station's website. The outage follows a controversial documentary about Russian protestors produced by NTV.,https://rt.com/news/tv-station-site-attacked-922/,3/20/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,Russia,,,,,,,,,
-2012-169,WHID 2012-169: Presidenta's Website Hacked,"The Casa Presidencial website (www.casapres.go.cr) was in temporary control of hackers on Sunday night, according to Communications Minister, Francisco Chac?_n.",http://www.insidecostarica.com/dailynews/2012/march/20/costarica12032005.htm,3/20/2012,Unknown,Unknown,Defacement,Government,Costa Rica,,,,,Joomla,,,,
-2012-169,WHID 2012-169: Presidenta's Website Hacked,"The Casa Presidencial website (www.casapres.go.cr) was in temporary control of hackers on Sunday night, according to Communications Minister, Francisco Chac?_n.",http://www.insidecostarica.com/dailynews/2012/march/20/costarica12032005.htm,3/20/2012,Unknown,Unknown,Defacement,Government,Costa Rica,,,,,Joomla,,,,
-2012-16,WHID 2012-16: SLCPD website hacked by activist group,The Salt Lake Police Department???s website has been hacked by the activist group ???Anonymous??? forcing a temporary shutdown on Tuesday afternoon.,http://www.abc4.com/content/news/top_stories/story/SLCPD-website-hacked-by-activist-group/bnNbGp8-yESR9QSm9PhKGQ.cspx,1/31/2012,SQL Injection,Improper Input Handling,Downtime,Law Enforcement,"Salt Lake City, Utah",Unknown,NA,1,Unknown,Unknown,Unknow,Email addresses,Unlisted,
-2012-16,WHID 2012-16: SLCPD website hacked by activist group,The Salt Lake Police Department???s website has been hacked by the activist group ???Anonymous??? forcing a temporary shutdown on Tuesday afternoon.,http://www.abc4.com/content/news/top_stories/story/SLCPD-website-hacked-by-activist-group/bnNbGp8-yESR9QSm9PhKGQ.cspx,1/31/2012,SQL Injection,Improper Input Handling,Downtime,Law Enforcement,"Salt Lake City, Utah",Unknown,NA,1,Unknown,Unknown,Unknow,Email addresses,Unlisted,
-2012-170,WHID 2012-170: Hackers attack Mexican websites over pope's visit,The group of cyberactivists known as Anonymous blocked access to two websites linked to the upcoming visit to Mexico by Pope Benedict XVI.,http://en.europeonline-magazine.eu/hackers-attack-mexican-websites-over-popes-visit_197890.html,3/20/2012,Unknown,Unknown,Defacement,Religious,"Mexico City, Mexico",,,,,,,,,
-2012-170,WHID 2012-170: Hackers attack Mexican websites over pope's visit,The group of cyberactivists known as Anonymous blocked access to two websites linked to the upcoming visit to Mexico by Pope Benedict XVI.,http://en.europeonline-magazine.eu/hackers-attack-mexican-websites-over-popes-visit_197890.html,3/20/2012,Unknown,Unknown,Defacement,Religious,"Mexico City, Mexico",,,,,,,,,
-2012-170,"WHID 2012-170: Qwest Datacenter ""Held Hostage"" by Hacker (Exclusive)","The hacker known as BlackJester claims that he managed to breach a number of servers owned by Qwest Communications International, one of the largest telecoms carrier in the United States.",http://news.softpedia.com/news/Qwest-Datacenter-quot-Held-Hostage-quot-by-Hacker-Exclusive-259500.shtml,3/19/2012,Unknown,Unknown,Downtime,Service Provider,US,,,,,,,,,
-2012-170,"WHID 2012-170: Qwest Datacenter ""Held Hostage"" by Hacker (Exclusive)","The hacker known as BlackJester claims that he managed to breach a number of servers owned by Qwest Communications International, one of the largest telecoms carrier in the United States.",http://news.softpedia.com/news/Qwest-Datacenter-quot-Held-Hostage-quot-by-Hacker-Exclusive-259500.shtml,3/19/2012,Unknown,Unknown,Downtime,Service Provider,US,,,,,,,,,
-2012-171,WHID 2012-171: PayPal closes potential flaw in login pages,"PayPal has closed a potentially serious security hole on its site, which cyber criminals could have used to steal passwords belonging to users of the online payment service. Read more: http://www.computing.co.uk/ctg/news/2163065/paypal-closes-potential-flaw-login-pages#ixzz1sKLhwvyd Computing - Insight for IT leaders Claim your free subscription today.",http://www.computing.co.uk/ctg/news/2163065/paypal-closes-potential-flaw-login-pages,3/23/2012,Cross-site Scripting (XSS),Improper Output Handling,Account Takeover,Finance,US,,,,,,,,,
-2012-171,WHID 2012-171: PayPal closes potential flaw in login pages,"PayPal has closed a potentially serious security hole on its site, which cyber criminals could have used to steal passwords belonging to users of the online payment service. Read more: http://www.computing.co.uk/ctg/news/2163065/paypal-closes-potential-flaw-login-pages#ixzz1sKLhwvyd Computing - Insight for IT leaders Claim your free subscription today.",http://www.computing.co.uk/ctg/news/2163065/paypal-closes-potential-flaw-login-pages,3/23/2012,Cross-site Scripting (XSS),Improper Output Handling,Account Takeover,Finance,US,,,,,,,,,
-2012-172,WHID 2012-172: Zappos CTO: hacking detected ???while it was in progress???,"When a hacker targeted Amazon subsidiary Zappos.com in January, the attacker went after company servers in both Nevada and Kentucky.",http://www.techflash.com/seattle/2012/03/zappos-cto-hacking-detected-in-progress.html,3/23/2012,SQL Injection,Improper Input Handling,Leakage of Information,Retail,"Nevada, US",,,,,,,,,
-2012-172,WHID 2012-172: Zappos CTO: hacking detected ???while it was in progress???,"When a hacker targeted Amazon subsidiary Zappos.com in January, the attacker went after company servers in both Nevada and Kentucky.",http://www.techflash.com/seattle/2012/03/zappos-cto-hacking-detected-in-progress.html,3/23/2012,SQL Injection,Improper Input Handling,Leakage of Information,Retail,"Nevada, US",,,,,,,,,
-2012-173,WHID 2012-173: Hackers booby-trap WordPress site with botnet-weaving Trojan,Malware-flingers are taking advantage of vulnerable WordPress sites as part of an attack ultimately designed to spread an information-stealing botnet agent.,http://www.theregister.co.uk/2012/03/23/wordpress_vuln_botnet_exploit/,3/23/2012,Unknown,Improper Output Handling,Planting of Malware,Blogs,US,,,,,Wordpress,,,,
-2012-173,WHID 2012-173: Hackers booby-trap WordPress site with botnet-weaving Trojan,Malware-flingers are taking advantage of vulnerable WordPress sites as part of an attack ultimately designed to spread an information-stealing botnet agent.,http://www.theregister.co.uk/2012/03/23/wordpress_vuln_botnet_exploit/,3/23/2012,Unknown,Improper Output Handling,Planting of Malware,Blogs,US,,,,,Wordpress,,,,
-2012-174,WHID 2012-174: Hackers Breach Credit Card Processor; 50K Cards Compromised,"Global Payments Inc, an Atlanta-based payments processor, has been broken into by hackers, leaving more than 50,000 card accounts potentially compromised, according to news reports.",http://www.wired.com/threatlevel/2012/03/global-payments-breached/,3/30/2012,Unknown,Unknown,Leakage of Information,Finance,"Atlanta, GA",,,,,,,,,
-2012-174,WHID 2012-174: Hackers Breach Credit Card Processor; 50K Cards Compromised,"Global Payments Inc, an Atlanta-based payments processor, has been broken into by hackers, leaving more than 50,000 card accounts potentially compromised, according to news reports.",http://www.wired.com/threatlevel/2012/03/global-payments-breached/,3/30/2012,Unknown,Unknown,Leakage of Information,Finance,"Atlanta, GA",,,,,,,,,
-2012-175,WHID 2012-175: Anonymous Takes Down And Defaces Chinese Government Web Sites,All has been relatively quiet on the Anonymous front as far as defacing Web sites are concerned. That has changed today as Anonymous China has attacked and defaced a number of Chinese government Web sites to protest the country???s censorship of the Internet.,http://www.webpronews.com/anonymous-takes-down-and-defaces-chines-government-web-sites-2012-03,3/30/2012,Unknown,Unknown,Defacement,Government,China,,,,,,,,,
-2012-175,WHID 2012-175: Anonymous Takes Down And Defaces Chinese Government Web Sites,All has been relatively quiet on the Anonymous front as far as defacing Web sites are concerned. That has changed today as Anonymous China has attacked and defaced a number of Chinese government Web sites to protest the country???s censorship of the Internet.,http://www.webpronews.com/anonymous-takes-down-and-defaces-chines-government-web-sites-2012-03,3/30/2012,Unknown,Unknown,Defacement,Government,China,,,,,,,,,
-2012-176,WHID 2012-176: Computer hacker tries to steal $1.8 million from Arlington's bank account Read more here: http://www.star-telegram.com/2012/04/01/3850876/computer-hacker-tries-to-steal.html#storylink=cpy,"A computer hacker tried to steal $1.8 million from the city's bank account in late February, but officials won't release details, citing an ongoing investigation. Read more here: http://www.star-telegram.com/2012/04/01/3850876/computer-hacker-tries-to-steal.html#storylink=cpy",http://www.star-telegram.com/2012/04/01/3850876/computer-hacker-tries-to-steal.html,4/1/2012,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,"Arlington, TX",,,,,,,,,
-2012-176,WHID 2012-176: Computer hacker tries to steal $1.8 million from Arlington's bank account Read more here: http://www.star-telegram.com/2012/04/01/3850876/computer-hacker-tries-to-steal.html#storylink=cpy,"A computer hacker tried to steal $1.8 million from the city's bank account in late February, but officials won't release details, citing an ongoing investigation. Read more here: http://www.star-telegram.com/2012/04/01/3850876/computer-hacker-tries-to-steal.html#storylink=cpy",http://www.star-telegram.com/2012/04/01/3850876/computer-hacker-tries-to-steal.html,4/1/2012,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,"Arlington, TX",,,,,,,,,
-2012-177,WHID 2012-177: Klout Hacked!,Some crafty Internet user recently announced that he/she has detected an exploitable XSS vulnerability that allows you to virtually inflate your score.,http://www.digitalversus.com/klout-hacked-n23928.html,4/2/2012,Cross-site Scripting (XSS),Improper Output Handling,Fraud,Social,US,,,,,,,,,
-2012-177,WHID 2012-177: Klout Hacked!,Some crafty Internet user recently announced that he/she has detected an exploitable XSS vulnerability that allows you to virtually inflate your score.,http://www.digitalversus.com/klout-hacked-n23928.html,4/2/2012,Cross-site Scripting (XSS),Improper Output Handling,Fraud,Social,US,,,,,,,,,
-2012-178,WHID 2012-178: Denial of Service Attack Targets Epoch Times,"The Epoch Times was hit with a series of cyber attacks beginning on March 29, with an unsuccessful distributed denial of service attack first targeting epochtimes.com, before follow-up stories on connected servers on the morning of April 1.",http://www.theepochtimes.com/n2/technology/denial-of-service-attack-targets-epoch-times-213907.html,4/2/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,"New York, NY",Yes,,,,,,,,
-2012-178,WHID 2012-178: Denial of Service Attack Targets Epoch Times,"The Epoch Times was hit with a series of cyber attacks beginning on March 29, with an unsuccessful distributed denial of service attack first targeting epochtimes.com, before follow-up stories on connected servers on the morning of April 1.",http://www.theepochtimes.com/n2/technology/denial-of-service-attack-targets-epoch-times-213907.html,4/2/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,"New York, NY",Yes,,,,,,,,
-2012-179,WHID 2012-179: Canadian opposition party targeted in botnet attack,"A malicious attacker deliberately attempted to interfere with a crucial party leadership vote in Canada last month, according to a company commissioned to run the online voting system used.",http://www.scmagazine.com/canadian-opposition-party-targeted-in-botnet-attack/article/234644/,4/2/2012,Denial of Service,Insufficient Anti-automation,Downtime,Politics,Canada,Yes,,,,,,,,
-2012-179,WHID 2012-179: Canadian opposition party targeted in botnet attack,"A malicious attacker deliberately attempted to interfere with a crucial party leadership vote in Canada last month, according to a company commissioned to run the online voting system used.",http://www.scmagazine.com/canadian-opposition-party-targeted-in-botnet-attack/article/234644/,4/2/2012,Denial of Service,Insufficient Anti-automation,Downtime,Politics,Canada,Yes,,,,,,,,
-2012-17,"WHID 2012-8: Zappos website hacked; credit card database not affected, CEO says","Computer hackers have penetrated the database of Australia's biggest internet domain name auction house, possibly accessing client home addresses and encrypted credit card numbers",http://www.theage.com.au/national/hackers-infiltrate-domain-name-auction-house-20120201-1qtgk.html,2/2/2012,Unknown,Unknown,Leakage of Information,Retail,Australia,Unknown,NA,1,Unknown,Unknown,,"name, email address, billing address, phone number and a cryptographically scrambled version of credit card and expiry date.",Unreported,
-2012-17,"WHID 2012-8: Zappos website hacked; credit card database not affected, CEO says","Computer hackers have penetrated the database of Australia's biggest internet domain name auction house, possibly accessing client home addresses and encrypted credit card numbers",http://www.theage.com.au/national/hackers-infiltrate-domain-name-auction-house-20120201-1qtgk.html,2/2/2012,Unknown,Unknown,Leakage of Information,Retail,Australia,Unknown,NA,1,Unknown,Unknown,,"name, email address, billing address, phone number and a cryptographically scrambled version of credit card and expiry date.",Unreported,
-2012-180,WHID 2012-180: Coordinated cyberattack knocks Al Qaeda jihadi websites offline,Five jihadi websites that make up the core online forums promoting Al Qaeda were knocked out 12 days ago and remain mostly offline in what appears to be a major cyberattack against the group.,http://www.alaskadispatch.com/article/coordinated-cyberattack-knocks-al-qaeda-jihadi-websites-offline,4/3/2012,Denial of Service,Insufficient Anti-automation,Downtime,Politics,Pakistan,Yes,,,,,,,,
-2012-180,WHID 2012-180: Coordinated cyberattack knocks Al Qaeda jihadi websites offline,Five jihadi websites that make up the core online forums promoting Al Qaeda were knocked out 12 days ago and remain mostly offline in what appears to be a major cyberattack against the group.,http://www.alaskadispatch.com/article/coordinated-cyberattack-knocks-al-qaeda-jihadi-websites-offline,4/3/2012,Denial of Service,Insufficient Anti-automation,Downtime,Politics,Pakistan,Yes,,,,,,,,
-2012-181,WHID 2012-181: Hackers leak Czech PM's private data,"Hackers posted on the internet the private data of Czech Prime Minister Petr Necas, including the numbers of his three mobile telephones, after a series of cyber attacks on government web sites, Czech media reported Wednesday.",http://twocircles.net/2012apr04/hackers_leak_czech_pms_private_data.html,4/4/2012,Unknown,Unknown,Leakage of Information,Government,Czechoslovakia,,,,,,,,,
-2012-181,WHID 2012-181: Hackers leak Czech PM's private data,"Hackers posted on the internet the private data of Czech Prime Minister Petr Necas, including the numbers of his three mobile telephones, after a series of cyber attacks on government web sites, Czech media reported Wednesday.",http://twocircles.net/2012apr04/hackers_leak_czech_pms_private_data.html,4/4/2012,Unknown,Unknown,Leakage of Information,Government,Czechoslovakia,,,,,,,,,
-2012-182,WHID 2012-182: Anonymous hacks hundreds of Chinese government sites,"Anonymous has hacked hundreds of Chinese government, company, and other general websites. The attacks range from basic defacements to personal data being compromised.",https://www.zdnet.com/blog/security/anonymous-hacks-hundreds-of-chinese-government-sites/11303,4/4/2012,Unknown,Unknown,Defacement,Government,China,Yes,Anonymous,485,,,,,,
-2012-182,WHID 2012-182: Anonymous hacks hundreds of Chinese government sites,"Anonymous has hacked hundreds of Chinese government, company, and other general websites. The attacks range from basic defacements to personal data being compromised.",https://www.zdnet.com/blog/security/anonymous-hacks-hundreds-of-chinese-government-sites/11303,4/4/2012,Unknown,Unknown,Defacement,Government,China,Yes,Anonymous,485,,,,,,
-2012-183,WHID 2012-183: European hackers suspected in Utah Medicaid files breach,"A data security breach at the Utah Health Department, believed to be the work of Eastern European hackers, has exposed 24,000 U.S. Medicaid files bearing names, Social Security numbers and other private information, state officials said on Wednesday.",http://articles.chicagotribune.com/2012-04-04/news/sns-rt-us-usa-hackers-utahbre83404g-20120404_1_data-security-breach-cyber-attack-hackers,4/4/2012,Unknown,Unknown,Leakage of Information,Healthcare,"Salt Lake City, UT",,,,,,,,,
-2012-183,WHID 2012-183: European hackers suspected in Utah Medicaid files breach,"A data security breach at the Utah Health Department, believed to be the work of Eastern European hackers, has exposed 24,000 U.S. Medicaid files bearing names, Social Security numbers and other private information, state officials said on Wednesday.",http://articles.chicagotribune.com/2012-04-04/news/sns-rt-us-usa-hackers-utahbre83404g-20120404_1_data-security-breach-cyber-attack-hackers,4/4/2012,Unknown,Unknown,Leakage of Information,Healthcare,"Salt Lake City, UT",,,,,,,,,
-2012-184,WHID 2012-184: Hacker steals Chinese government defense contracts,"Hacktivist Hardcore Charlie says he has hacked China National Import & Export Corp (CEIC), a Chinese government defense contractor, and stole over 500MB worth of documents.",https://www.zdnet.com/blog/security/hacker-steals-chinese-government-defense-contracts/11386,4/6/2012,Unknown,Unknown,Leakage of Information,Government,China,,,,,,,,,
-2012-184,WHID 2012-184: Hacker steals Chinese government defense contracts,"Hacktivist Hardcore Charlie says he has hacked China National Import & Export Corp (CEIC), a Chinese government defense contractor, and stole over 500MB worth of documents.",https://www.zdnet.com/blog/security/hacker-steals-chinese-government-defense-contracts/11386,4/6/2012,Unknown,Unknown,Leakage of Information,Government,China,,,,,,,,,
-2012-185,WHID 2012-185: FedEx employee charged with cyber attack on Marlboro company,A 20-year-old FedEx employee is facing a charge in federal court after he allegedly launched a cyber attack on a Marlboro human resources company.,http://www.telegram.com/article/20120406/NEWS/120409643/1116,4/6/2012,Brute Force,Insufficient Anti-automation,Account Takeover,Healthcare,"Marlborough, MA",,,,,,,,,
-2012-185,WHID 2012-185: FedEx employee charged with cyber attack on Marlboro company,A 20-year-old FedEx employee is facing a charge in federal court after he allegedly launched a cyber attack on a Marlboro human resources company.,http://www.telegram.com/article/20120406/NEWS/120409643/1116,4/6/2012,Brute Force,Insufficient Anti-automation,Account Takeover,Healthcare,"Marlborough, MA",,,,,,,,,
-2012-186,WHID 2012-186: Hackers claiming ties to Anonymous target UK government website,Britain???s Home Office confirmed Sunday that its website was attacked overnight after hackers claimed responsibility for shutting it down.,http://www.washingtonpost.com/world/europe/hackers-claiming-ties-to-anonymous-target-uk-government-website/2012/04/08/gIQAZZch3S_story.html,4/8/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,UK,Yes,Anonymous,,,,,,,
-2012-186,WHID 2012-186: Hackers claiming ties to Anonymous target UK government website,Britain???s Home Office confirmed Sunday that its website was attacked overnight after hackers claimed responsibility for shutting it down.,http://www.washingtonpost.com/world/europe/hackers-claiming-ties-to-anonymous-target-uk-government-website/2012/04/08/gIQAZZch3S_story.html,4/8/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,UK,Yes,Anonymous,,,,,,,
-2012-187,WHID 2012-187: Hacked Again: Lessons Learned,"Analysis: For the second time in two years my WordPress site was hacked, this time by Viagra spammers. Here are a few of the hard lessons I learned.",https://www.pcworld.com/article/253408/hacked_again_lessons_learned.html,4/8/2012,Remote File Inclusion (RFI),Misconfiguration,Spam,Blogs,"San Francisco, CA",,,,,Wordpress,,,,
-2012-187,WHID 2012-187: Hacked Again: Lessons Learned,"Analysis: For the second time in two years my WordPress site was hacked, this time by Viagra spammers. Here are a few of the hard lessons I learned.",https://www.pcworld.com/article/253408/hacked_again_lessons_learned.html,4/8/2012,Remote File Inclusion (RFI),Misconfiguration,Spam,Blogs,"San Francisco, CA",,,,,Wordpress,,,,
-2012-188,WHID 2012-188: Reports: Gulf Air's Facebook page gets hacked,"Gulf Air, Bahrain's state airline, said that its Facebook page had been hacked on Monday and that the nation's Internet crime division is investigating, according to the Associated Press.",http://travel.usatoday.com/flights/post/2012/04/gulf-airs-facebook-page-gets-hacked/667184/1,4/10/2012,Unknown,Unknown,Defacement,Social,"Menlo Park, CA",,,,,,,,,
-2012-188,WHID 2012-188: Reports: Gulf Air's Facebook page gets hacked,"Gulf Air, Bahrain's state airline, said that its Facebook page had been hacked on Monday and that the nation's Internet crime division is investigating, according to the Associated Press.",http://travel.usatoday.com/flights/post/2012/04/gulf-airs-facebook-page-gets-hacked/667184/1,4/10/2012,Unknown,Unknown,Defacement,Social,"Menlo Park, CA",,,,,,,,,
-2012-189,WHID 2012-189: FP?? website hacked by Annonymous,"The website of the Austrian Freedom Party's (FP??) education institute was hacked on Easter Sunday with the slogan ""Osterei statt Nazipartei"" which translates as Easter eggs instead of Nazi Party.",http://austrianindependent.com/news/General_News/2012-04-09/10827/FP%D6_website_hacked_by_Annonymous,4/9/2012,Unknown,Unknown,Defacement,Politics,Austria,,,,,,,,,
-2012-189,WHID 2012-189: FP?? website hacked by Annonymous,"The website of the Austrian Freedom Party's (FP??) education institute was hacked on Easter Sunday with the slogan ""Osterei statt Nazipartei"" which translates as Easter eggs instead of Nazi Party.",http://austrianindependent.com/news/General_News/2012-04-09/10827/FP%D6_website_hacked_by_Annonymous,4/9/2012,Unknown,Unknown,Defacement,Politics,Austria,,,,,,,,,
-2012-18,WHID 2012-18: barnesville.com hit by denial of service attack,websites at barnesville.com and pikecountygeorgia.com were hit by a denial of service attack emanating from Chicago and various points in China.,http://www.barnesville.com/archives/4414-barnesville.com-hit-by-denial-of-service-attack.html,2/1/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,"Barnesville, Georgia",Yes,Distributed Denial of Service,2,Chicago and China,Unknown,Unknown,Unknown,NA,
-2012-18,WHID 2012-18: barnesville.com hit by denial of service attack,websites at barnesville.com and pikecountygeorgia.com were hit by a denial of service attack emanating from Chicago and various points in China.,http://www.barnesville.com/archives/4414-barnesville.com-hit-by-denial-of-service-attack.html,2/1/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,"Barnesville, Georgia",Yes,Distributed Denial of Service,2,Chicago and China,Unknown,Unknown,Unknown,NA,
-2012-190,WHID 2012-190: Anonymous Said to Be Behind Website Attacks on Trade Groups,"The hacker-activist group known as Anonymous led attacks on the websites of two technology trade associations for supporting cybersecurity legislation, the organizations said. Read more: http://www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2012/04/09/bloomberg_articlesM283AE1A1I4G01-M28AL.DTL#ixzz1sOvvLODH",http://www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2012/04/09/bloomberg_articlesM283AE1A1I4G01-M28AL.DTL#ixzz1sOvjfa7v,4/9/2012,Denial of Service,Insufficient Anti-automation,Downtime,Technology,"Washington, DC",Yes,Anonymous,,,,,,,
-2012-190,WHID 2012-190: Anonymous Said to Be Behind Website Attacks on Trade Groups,"The hacker-activist group known as Anonymous led attacks on the websites of two technology trade associations for supporting cybersecurity legislation, the organizations said. Read more: http://www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2012/04/09/bloomberg_articlesM283AE1A1I4G01-M28AL.DTL#ixzz1sOvvLODH",http://www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2012/04/09/bloomberg_articlesM283AE1A1I4G01-M28AL.DTL#ixzz1sOvjfa7v,4/9/2012,Denial of Service,Insufficient Anti-automation,Downtime,Technology,"Washington, DC",Yes,Anonymous,,,,,,,
-2012-191,WHID 2012-191: Anonymous takes out Boeing website,"Anonymous is taking responsibility for launching a coordinated cyberattack on Boeing's website, a high-profile takedown that's part of the hacking collective's campaign against what it believes is a stifling piece of federal legislation.",http://www.technolog.msnbc.msn.com/technology/technolog/anonymous-takes-out-boeing-website-708942,4/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Technology,US,Yes,Anonymous,,,,,,,
-2012-191,WHID 2012-191: Anonymous takes out Boeing website,"Anonymous is taking responsibility for launching a coordinated cyberattack on Boeing's website, a high-profile takedown that's part of the hacking collective's campaign against what it believes is a stifling piece of federal legislation.",http://www.technolog.msnbc.msn.com/technology/technolog/anonymous-takes-out-boeing-website-708942,4/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Technology,US,Yes,Anonymous,,,,,,,
-2012-192,WHID 2012-192: National Organization For Marriage Website Hacked On Same Day Group Endorses Mitt Romney,"On the same morning that the National Organization for Marriage announced that it was endorsing Mitt Romney, the group dedicated to stopping the marriage equality movement also found its website and social media outlets hacked with a promise to stop dividing Americans.",http://www.huffingtonpost.com/2012/04/11/mitt-romney-endorsed-nom-national-organization-marriage_n_1417338.html?ref=mostpopular,4/11/2012,Unknown,Unknown,Defacement,Politics,"San Francisco, CA",,,,,,,,,
-2012-192,WHID 2012-192: National Organization For Marriage Website Hacked On Same Day Group Endorses Mitt Romney,"On the same morning that the National Organization for Marriage announced that it was endorsing Mitt Romney, the group dedicated to stopping the marriage equality movement also found its website and social media outlets hacked with a promise to stop dividing Americans.",http://www.huffingtonpost.com/2012/04/11/mitt-romney-endorsed-nom-national-organization-marriage_n_1417338.html?ref=mostpopular,4/11/2012,Unknown,Unknown,Defacement,Politics,"San Francisco, CA",,,,,,,,,
-2012-193,WHID 2012-193: National Organization For Marriage Twitter Account Hacked,"The hacker also put up a tweet on NOM's Twitter account, NOMTweets, reading, ""Yes, creating a wedge between the black community and #lgbt was wrong. We vow to work on how we address our opponents in the future.""",http://www.huffingtonpost.com/2012/04/11/mitt-romney-endorsed-nom-national-organization-marriage_n_1417338.html?ref=mostpopular,4/11/2012,Unknown,Unknown,Disinformation,Social,"San Francisco, CA",,,,,Twitter,,,,
-2012-193,WHID 2012-193: National Organization For Marriage Twitter Account Hacked,"The hacker also put up a tweet on NOM's Twitter account, NOMTweets, reading, ""Yes, creating a wedge between the black community and #lgbt was wrong. We vow to work on how we address our opponents in the future.""",http://www.huffingtonpost.com/2012/04/11/mitt-romney-endorsed-nom-national-organization-marriage_n_1417338.html?ref=mostpopular,4/11/2012,Unknown,Unknown,Disinformation,Social,"San Francisco, CA",,,,,Twitter,,,,
-2012-194,"WHID 2012-194: Dude, you???ve just been ???Likejacked??? by the Fortune 500",Facebook 'Likejacking' scams can fool even the savviest users. But behind the scammers lie some of the powerful marketing firms in the world.,http://www.itworld.com/it-managementstrategy/266618/dude-you-ve-just-been-likejacked-fortune-500,4/10/2012,Clickjacking,Insufficient Process Validation,Spam,Social,"Menlo Park, CA",,,,,Facebook,,,,
-2012-194,"WHID 2012-194: Dude, you???ve just been ???Likejacked??? by the Fortune 500",Facebook 'Likejacking' scams can fool even the savviest users. But behind the scammers lie some of the powerful marketing firms in the world.,http://www.itworld.com/it-managementstrategy/266618/dude-you-ve-just-been-likejacked-fortune-500,4/10/2012,Clickjacking,Insufficient Process Validation,Spam,Social,"Menlo Park, CA",,,,,Facebook,,,,
-2012-195,"WHID 2012-195: Zimbabwe International Trade Fair website hacked, taken down","We established this morning that the website belonging to the Zimbabwe International Trade Fair Company, www.zitf.net was hacked.",http://www.techzim.co.zw/2012/04/zimbabwe-international-trade-fair-website-hacked/,4/13/2012,Unknown,Unknown,Defacement,Media,Zimbabwe,,,,,,,,,
-2012-195,"WHID 2012-195: Zimbabwe International Trade Fair website hacked, taken down","We established this morning that the website belonging to the Zimbabwe International Trade Fair Company, www.zitf.net was hacked.",http://www.techzim.co.zw/2012/04/zimbabwe-international-trade-fair-website-hacked/,4/13/2012,Unknown,Unknown,Defacement,Media,Zimbabwe,,,,,,,,,
-2012-196,"WHID 2012-196: US, UK govt. websites downed in Anonymous-claimed attack","More US and UK government websites have fallen prey to DDoS attacks by the hacktivist group Anonymous. The victims now include the US Department of Justice, CIA and two MI6 sites.",https://rt.com/news/cia-ddos-attacks-usa-120/,4/16/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Multiple,Yes,Anonymous,,,,,,,
-2012-196,"WHID 2012-196: US, UK govt. websites downed in Anonymous-claimed attack","More US and UK government websites have fallen prey to DDoS attacks by the hacktivist group Anonymous. The victims now include the US Department of Justice, CIA and two MI6 sites.",https://rt.com/news/cia-ddos-attacks-usa-120/,4/16/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Multiple,Yes,Anonymous,,,,,,,
-2012-197,WHID 2012-197: Hackers take down 15 Lebanese government websites,"A group calling itself ""Raise Your Voice"" hacked into 15 Lebanese government websites on Tuesday, demanding an improvement in living standards and an end to widespread electricity and water shortages.",http://www.reuters.com/article/2012/04/17/lebanon-hackers-idUSL6E8FH1P320120417,4/17/2012,Unknown,Unknown,Defacement,Government,"Beirut, Lebanon",,,,,,,,,
-2012-197,WHID 2012-197: Hackers take down 15 Lebanese government websites,"A group calling itself ""Raise Your Voice"" hacked into 15 Lebanese government websites on Tuesday, demanding an improvement in living standards and an end to widespread electricity and water shortages.",http://www.reuters.com/article/2012/04/17/lebanon-hackers-idUSL6E8FH1P320120417,4/17/2012,Unknown,Unknown,Defacement,Government,"Beirut, Lebanon",,,,,,,,,
-2012-198,WHID 2012-198: 3 million bank accounts hacked in Iran,"First, he warned of the security flaw in Iran???s banking system. Then he provided them with 1,000 bank account details. When they didn???t listen, he hacked 3 million accounts across at least 22 banks.",https://www.zdnet.com/blog/security/3-million-bank-accounts-hacked-in-iran/11577,4/16/2012,Unknown,Unknown,Leakage of Information,Finance,Iran,,,,,,,,,
-2012-198,WHID 2012-198: 3 million bank accounts hacked in Iran,"First, he warned of the security flaw in Iran???s banking system. Then he provided them with 1,000 bank account details. When they didn???t listen, he hacked 3 million accounts across at least 22 banks.",https://www.zdnet.com/blog/security/3-million-bank-accounts-hacked-in-iran/11577,4/16/2012,Unknown,Unknown,Leakage of Information,Finance,Iran,,,,,,,,,
-2012-199,"WHID 2012-199: Google Sends Out 20,000 Weird Redirect Hacked Notifications","Yesterday, Google sent out about 20,000 warnings to webmasters that have had their sites compromised and may have no idea about it.",http://www.seroundtable.com/google-hacked-redirect-warning-15022.html,4/16/2012,Unknown,Improper Output Handling,Planting of Malware,Search Engine,"Mountain View, CA",,,,,,,,,
-2012-199,"WHID 2012-199: Google Sends Out 20,000 Weird Redirect Hacked Notifications","Yesterday, Google sent out about 20,000 warnings to webmasters that have had their sites compromised and may have no idea about it.",http://www.seroundtable.com/google-hacked-redirect-warning-15022.html,4/16/2012,Unknown,Improper Output Handling,Planting of Malware,Search Engine,"Mountain View, CA",,,,,,,,,
-2012-19,WHID 2012-19: Anonymous hackers claim hit on Swedish government,"A group linked to the hacker network Anonymous on Saturday said it had attacked the Swedish government's website, bringing it down for periods of time by overloading it with traffic.",http://www.deseretnews.com/article/700222228/Anonymous-hackers-claim-hit-on-Swedish-government.html,2/4/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Sweden,Yes,Distributed Denial of Service,1,Unknown,Unreported,,,Unknown,
-2012-19,WHID 2012-19: Anonymous hackers claim hit on Swedish government,"A group linked to the hacker network Anonymous on Saturday said it had attacked the Swedish government's website, bringing it down for periods of time by overloading it with traffic.",http://www.deseretnews.com/article/700222228/Anonymous-hackers-claim-hit-on-Swedish-government.html,2/4/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Sweden,Yes,Distributed Denial of Service,1,Unknown,Unreported,,,Unknown,
-2012-1,WHID-2012-1: PrivateX hacker group defaces Office of Vice President site again,"Hackers struck twice on New Year's Day, defacing another government website on Sunday evening and calling anew for ""information security"" but this time, also appearing to taunt its target.",http://www.gmanetwork.com/news/story/243236/scitech/technology/privatex-hacker-group-defaces-office-of-vice-president-site-again,1/1/2012,Unknown,Unknown,Defacement,Government,Phillipines,No,N/A,1,Unknown,Unknown,,,,
-2012-200,WHID 2012-200: Bersih website suffers DDoS attack,The coalition for clean and fair elections Bersih claimed that its website was under a distributed denial-of-service (DDoS) attack for 13 hours yesterday.,http://www.malaysiakini.com/news/195392,4/17/2012,Denial of Service,Insufficient Anti-automation,Downtime,Politics,"Selangor, Malaysia",,,,,,,,,
-2012-200,WHID 2012-200: Bersih website suffers DDoS attack,The coalition for clean and fair elections Bersih claimed that its website was under a distributed denial-of-service (DDoS) attack for 13 hours yesterday.,http://www.malaysiakini.com/news/195392,4/17/2012,Denial of Service,Insufficient Anti-automation,Downtime,Politics,"Selangor, Malaysia",,,,,,,,,
-2012-201,WHID 2012-201: Cyber attack hits Melbourne firm York Butter Factory,A LOW-SCALE cyber-attack on a US hosting company has created a headache for Melbourne tech-incubation space York Butter Factory.,http://www.theaustralian.com.au/australian-it/cyber-attack-hits-melbourne-firm-york-butter-factory/story-e6frgakx-1226331872949,4/18/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,"Melbourne, Australia",Yes,,,,,,,,
-2012-201,WHID 2012-201: Cyber attack hits Melbourne firm York Butter Factory,A LOW-SCALE cyber-attack on a US hosting company has created a headache for Melbourne tech-incubation space York Butter Factory.,http://www.theaustralian.com.au/australian-it/cyber-attack-hits-melbourne-firm-york-butter-factory/story-e6frgakx-1226331872949,4/18/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,"Melbourne, Australia",Yes,,,,,,,,
-2012-202,WHID 2012-202: XS4ALL hit by massive DDoS attack,"Dutch ISP XS4ALL has been hit by a large-scale DDoS attack, Tweakers.net reported. Customers are experiencing difficulties in accessing webmail; other services are also available on a limited basis.",http://www.telecompaper.com/news/xs4all-hit-by-massive-ddos-attack,4/18/2012,Denial of Service,Insufficient Anti-automation,Downtime,Service Provider,Netherlands,,,,,,,,,
-2012-202,WHID 2012-202: XS4ALL hit by massive DDoS attack,"Dutch ISP XS4ALL has been hit by a large-scale DDoS attack, Tweakers.net reported. Customers are experiencing difficulties in accessing webmail; other services are also available on a limited basis.",http://www.telecompaper.com/news/xs4all-hit-by-massive-ddos-attack,4/18/2012,Denial of Service,Insufficient Anti-automation,Downtime,Service Provider,Netherlands,,,,,,,,,
-2012-203,WHID 2012-203: Hackers Briefly Shut Down NYC.gov,"Hackers briefly shut down the official city website Tuesday. The city's information technology department says NYC.gov was the target of what's called a ""denial of service attack"" Tuesday.",http://www.ny1.com/content/news_beats/political_news/159597/hackers-briefly-shut-down-nyc-gov,4/17/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,"New York, NY",Yes,,,,,,,,
-2012-203,WHID 2012-203: Hackers Briefly Shut Down NYC.gov,"Hackers briefly shut down the official city website Tuesday. The city's information technology department says NYC.gov was the target of what's called a ""denial of service attack"" Tuesday.",http://www.ny1.com/content/news_beats/political_news/159597/hackers-briefly-shut-down-nyc-gov,4/17/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,"New York, NY",Yes,,,,,,,,
-2012-204,WHID 2012-204: GetMama ??? Conditional malware affecting thousands of sites,We have been tracking an interesting malware that is affecting thousands of compromised sites. We call it GetMama!!,http://blog.sucuri.net/2012/04/getmama-conditional-malware-affecting-thousands-of-sites.html,4/10/2012,Unknown,Improper Output Handling,Planting of Malware,Multiple,Multiple,,,,,,,,,
-2012-204,WHID 2012-204: GetMama ??? Conditional malware affecting thousands of sites,We have been tracking an interesting malware that is affecting thousands of compromised sites. We call it GetMama!!,http://blog.sucuri.net/2012/04/getmama-conditional-malware-affecting-thousands-of-sites.html,4/10/2012,Unknown,Improper Output Handling,Planting of Malware,Multiple,Multiple,,,,,,,,,
-2012-205,WHID 2012-205: Nikjju Mass injection campaign (180k+ pages compromised),"Our research team have been tracking a new mass SQL injection campaign that started early this month. So far more than 180,000 URLs have been compromised. We will keep posting updates as we get them.",http://blog.sucuri.net/2012/04/nikjju-mass-injection-campaign-150k-sites-compromised.html,4/17/2012,SQL Injection,Improper Input Handling,Planting of Malware,Multiple,Multiple,,,,,,,,,
-2012-205,WHID 2012-205: Nikjju Mass injection campaign (180k+ pages compromised),"Our research team have been tracking a new mass SQL injection campaign that started early this month. So far more than 180,000 URLs have been compromised. We will keep posting updates as we get them.",http://blog.sucuri.net/2012/04/nikjju-mass-injection-campaign-150k-sites-compromised.html,4/17/2012,SQL Injection,Improper Input Handling,Planting of Malware,Multiple,Multiple,,,,,,,,,
-2012-206,WHID 2012-206: FBI Charges Man In $1 Million Stock-Fraud Hacking Scheme,Hacking crew used accounts under its control to conduct sham trades,http://www.darkreading.com/security-monitoring/167901086/security/news/232900535/fbi-charges-man-in-1-million-stock-fraud-hacking-scheme.html,4/18/2012,Unknown,Unknown,Monetary Loss,Finance,Multiple,,,,,,,,,
-2012-206,WHID 2012-206: FBI Charges Man In $1 Million Stock-Fraud Hacking Scheme,Hacking crew used accounts under its control to conduct sham trades,http://www.darkreading.com/security-monitoring/167901086/security/news/232900535/fbi-charges-man-in-1-million-stock-fraud-hacking-scheme.html,4/18/2012,Unknown,Unknown,Monetary Loss,Finance,Multiple,,,,,,,,,
-2012-207,WHID 2012-207: SHSU website hacked by black hat SEO techniques,"Changes have been restored to the Sam Houston State University catalog website after it was hacked on April 12, according to an email sent out to SHSU web developers by Jurden Bruce, web services manager.",http://www.houstonianonline.com/news/shsu-website-hacked-by-black-hat-seo-techniques-1.2732151#.T5BPa5pWr6Q,4/12/2012,Unknown,Unknown,Spam,Education,Texas,,,,,,,,,
-2012-207,WHID 2012-207: SHSU website hacked by black hat SEO techniques,"Changes have been restored to the Sam Houston State University catalog website after it was hacked on April 12, according to an email sent out to SHSU web developers by Jurden Bruce, web services manager.",http://www.houstonianonline.com/news/shsu-website-hacked-by-black-hat-seo-techniques-1.2732151#.T5BPa5pWr6Q,4/12/2012,Unknown,Unknown,Spam,Education,Texas,,,,,,,,,
-2012-208,WHID 2012-208: Tosh UK rewards competition hopefuls by exposing their privates,"""A security fault with the incremental numbering of the competition entrants registration URL created the potential for access to other customers' personal data for a two-month period,"" the regulator said.",http://www.theregister.co.uk/2012/04/18/toshiba_slapped_by_ico/,4/18/2012,Forceful Browsing,Predictable Resource Location,Leakage of Information,Technology,UK,,,,,,,,,
-2012-208,WHID 2012-208: Tosh UK rewards competition hopefuls by exposing their privates,"""A security fault with the incremental numbering of the competition entrants registration URL created the potential for access to other customers' personal data for a two-month period,"" the regulator said.",http://www.theregister.co.uk/2012/04/18/toshiba_slapped_by_ico/,4/18/2012,Forceful Browsing,Predictable Resource Location,Leakage of Information,Technology,UK,,,,,,,,,
-2012-209,WHID 2012-209: Hundreds of thousands of medical records accessible,"Medical and personal information of more than 300,000 employees through a leak in the software of the computer Humannet IT business VCD months been accessible to unauthorized persons. This is the finding of Zembla, in the episode ""The police absenteeism II 'Friday, April 20.",http://www.dutchnews.nl/news/archives/2012/04/new_online_medical_records_sca.php,4/19/2012,SQL Injection,Improper Input Handling,Leakage of Information,Healthcare,Netherlands,,,,,,,,,
-2012-209,WHID 2012-209: Hundreds of thousands of medical records accessible,"Medical and personal information of more than 300,000 employees through a leak in the software of the computer Humannet IT business VCD months been accessible to unauthorized persons. This is the finding of Zembla, in the episode ""The police absenteeism II 'Friday, April 20.",http://www.dutchnews.nl/news/archives/2012/04/new_online_medical_records_sca.php,4/19/2012,SQL Injection,Improper Input Handling,Leakage of Information,Healthcare,Netherlands,,,,,,,,,
-2012-20,WHID 2012-20: Citigroup Inc. (NYSE:C) Hit By Hackers,"Hackers have attacked Brazilian financial websites, including Citigroup Inc. (NYSE:C).",http://www.emoneydaily.com/citigroup-inc-nysec-hit-by-hackers/69823284/,2/4/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,South America,Yes,Distributed Denial of Service,Multiple,Unknown,,,,Unknown,
-2012-20,WHID 2012-20: Citigroup Inc. (NYSE:C) Hit By Hackers,"Hackers have attacked Brazilian financial websites, including Citigroup Inc. (NYSE:C).",http://www.emoneydaily.com/citigroup-inc-nysec-hit-by-hackers/69823284/,2/4/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,South America,Yes,Distributed Denial of Service,Multiple,Unknown,,,,Unknown,
-2012-210,WHID 2012-210: 15-year-old arrested for hacking 259 companies,"A 15-year-old boy has been arrested for hacking into 259 companies during a 90-day spree. In other words, during the last quarter he successfully attacked an average of three websites per day.",https://www.zdnet.com/blog/security/15-year-old-arrested-for-hacking-259-companies/11585?tag=content;siu-container,4/17/2012,Unknown,Unknown,Leakage of Information,Multiple,Multiple,,,,,,,,,
-2012-210,WHID 2012-210: 15-year-old arrested for hacking 259 companies,"A 15-year-old boy has been arrested for hacking into 259 companies during a 90-day spree. In other words, during the last quarter he successfully attacked an average of three websites per day.",https://www.zdnet.com/blog/security/15-year-old-arrested-for-hacking-259-companies/11585?tag=content;siu-container,4/17/2012,Unknown,Unknown,Leakage of Information,Multiple,Multiple,,,,,,,,,
-2012-211,"WHID 2012-211: Anti-abortion hacker jailed for stealing 10,000 records","Anonymous member James Jeffery last month hacked into the British Pregnancy Advisory Service (BPAS) and stole 10,000 database records. He has now been sentenced to 32 months in jail.",https://www.zdnet.com/blog/security/anti-abortion-hacker-jailed-for-stealing-10000-records/11558?tag=content;siu-container,4/17/2012,Unknown,Unknown,Leakage of Information,Healthcare,UK,,,,,,,,,
-2012-211,"WHID 2012-211: Anti-abortion hacker jailed for stealing 10,000 records","Anonymous member James Jeffery last month hacked into the British Pregnancy Advisory Service (BPAS) and stole 10,000 database records. He has now been sentenced to 32 months in jail.",https://www.zdnet.com/blog/security/anti-abortion-hacker-jailed-for-stealing-10000-records/11558?tag=content;siu-container,4/17/2012,Unknown,Unknown,Leakage of Information,Healthcare,UK,,,,,,,,,
-2012-212,WHID 2012-212: D.C. government website downed by hackers,"City government websites in the District failed to load for hours on Thursday, the apparent victims of hackers who wanted to target government sites.",http://www.washingtontimes.com/news/2012/apr/19/dc-government-website-downed-hackers/,4/19/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Washington, DC",Yes,,,,,,,,
-2012-212,WHID 2012-212: D.C. government website downed by hackers,"City government websites in the District failed to load for hours on Thursday, the apparent victims of hackers who wanted to target government sites.",http://www.washingtontimes.com/news/2012/apr/19/dc-government-website-downed-hackers/,4/19/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Washington, DC",Yes,,,,,,,,
-2012-213,WHID 2012-213: Hacker attack underlines Web role in China scandal,"A massive hacker attack has crippled an overseas website that has reported extensively on China's biggest political turmoil in years, underscoring the pivotal role the Internet has played in the unfolding scandal.",https://www.ajc.com/news/nation-world/hacker-attack-underlines-web-1422689.html,4/20/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,North Carolina,Yes,,,,,,,,
-2012-213,WHID 2012-213: Hacker attack underlines Web role in China scandal,"A massive hacker attack has crippled an overseas website that has reported extensively on China's biggest political turmoil in years, underscoring the pivotal role the Internet has played in the unfolding scandal.",https://www.ajc.com/news/nation-world/hacker-attack-underlines-web-1422689.html,4/20/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,North Carolina,Yes,,,,,,,,
-2012-214,WHID 2012-214: 'Chinese' hackers deface Philippine website,"Hackers claiming to come from China defaced the website of the Philippines' top university on Friday to assert their country's claim over the hotly disputed South China Sea, the government said.",http://www.google.com/hostednews/afp/article/ALeqM5ieavMTCtsDq6Jzd8wBfyGQTNj4NA?docId=CNG.46b40181ee39a090b52dd63a46e30e61.421,4/20/2012,Unknown,Unknown,Defacement,Education,"Manila, Philippines",,,,China,,,,,
-2012-214,WHID 2012-214: 'Chinese' hackers deface Philippine website,"Hackers claiming to come from China defaced the website of the Philippines' top university on Friday to assert their country's claim over the hotly disputed South China Sea, the government said.",http://www.google.com/hostednews/afp/article/ALeqM5ieavMTCtsDq6Jzd8wBfyGQTNj4NA?docId=CNG.46b40181ee39a090b52dd63a46e30e61.421,4/20/2012,Unknown,Unknown,Defacement,Education,"Manila, Philippines",,,,China,,,,,
-2012-215,WHID 2012-215: Berrien County government website hacked,"A group of hackers got into the Berrien County government website earlier this week and left behind profanity and their views on government, authorities said Thursday.",http://www.mlive.com/news/kalamazoo/index.ssf/2012/04/berrien_county_government_webs.html,4/20/2012,Brute Force,Insufficient Anti-automation,Defacement,Government,"ST. JOSEPH, MI",,,,,,,,,
-2012-215,WHID 2012-215: Berrien County government website hacked,"A group of hackers got into the Berrien County government website earlier this week and left behind profanity and their views on government, authorities said Thursday.",http://www.mlive.com/news/kalamazoo/index.ssf/2012/04/berrien_county_government_webs.html,4/20/2012,Brute Force,Insufficient Anti-automation,Defacement,Government,"ST. JOSEPH, MI",,,,,,,,,
-2012-216,WHID 2012-216: Cyber war: Palace websites attacked,"Chinese hackers were at it again, and this time they attacked the presidential websites.",http://globalnation.inquirer.net/34465/cyber-war-palace-websites-attacked,4/22/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Philipines,Yes,Denial of Service,3,China,Unknown,Unknown,None,NA,
-2012-216,WHID 2012-216: Cyber war: Palace websites attacked,"Chinese hackers were at it again, and this time they attacked the presidential websites.",http://globalnation.inquirer.net/34465/cyber-war-palace-websites-attacked,4/22/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Philipines,Yes,Denial of Service,3,China,Unknown,Unknown,None,NA,
-2012-217,WHID 2012-217: U.S. Web site covering China scandal disrupted by cyberattack,"A U.S.-based Web site that has aggressively covered China???s biggest political scandal in decades was the victim of a disruptive attack that was accompanied by threats to the service that registers its domain name, the site???s manager said Friday.",http://www.washingtonpost.com/world/national-security/us-web-site-covering-china-scandal-disrupted-by-cyberattack/2012/04/20/gIQAZbRcWT_story.html,4/20/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,China,Yes,,,,,,,,
-2012-217,WHID 2012-217: U.S. Web site covering China scandal disrupted by cyberattack,"A U.S.-based Web site that has aggressively covered China???s biggest political scandal in decades was the victim of a disruptive attack that was accompanied by threats to the service that registers its domain name, the site???s manager said Friday.",http://www.washingtonpost.com/world/national-security/us-web-site-covering-china-scandal-disrupted-by-cyberattack/2012/04/20/gIQAZbRcWT_story.html,4/20/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,China,Yes,,,,,,,,
-2012-218,WHID 2012-218: Anonymous Shuts Down Formula 1 Website Ahead of Bahrain Grand Prix,"Anonymous, a hacker collective, has shut down the official Formula 1 website after a series of violent protests ahead of its race in Bahrain.",http://www.ibtimes.com/articles/331171/20120420/anonymous-formula-1-website-bahrain-grand-prix.htm,4/20/2012,Denial of Service,Insufficient Anti-automation,Downtime,Sports,Bahrain,Yes,,,,,,,,
-2012-218,WHID 2012-218: Anonymous Shuts Down Formula 1 Website Ahead of Bahrain Grand Prix,"Anonymous, a hacker collective, has shut down the official Formula 1 website after a series of violent protests ahead of its race in Bahrain.",http://www.ibtimes.com/articles/331171/20120420/anonymous-formula-1-website-bahrain-grand-prix.htm,4/20/2012,Denial of Service,Insufficient Anti-automation,Downtime,Sports,Bahrain,Yes,,,,,,,,
-2012-219,WHID 2012-219: Hacker strikes Parliament website,"The Government's parliamentary website, www.ttparliament.org, was taken offline yesterday after a computer software hacker apparently breached the security codes of the site and left a mischievous message announcing the security break.",http://www.trinidadexpress.com/news/Hacker_strikes_Parliament_website-148466945.html,4/22/2012,Unknown,Unknown,Defacement,Government,Trinidad,,,,,,,,,
-2012-219,WHID 2012-219: Hacker strikes Parliament website,"The Government's parliamentary website, www.ttparliament.org, was taken offline yesterday after a computer software hacker apparently breached the security codes of the site and left a mischievous message announcing the security break.",http://www.trinidadexpress.com/news/Hacker_strikes_Parliament_website-148466945.html,4/22/2012,Unknown,Unknown,Defacement,Government,Trinidad,,,,,,,,,
-2012-21,WHID 2012-21: Hackers attack law enforcement websites,"Saboteurs have hacked into the websites of several law enforcement agencies worldwide in attacks attributed to the collective called Anonymous, including in Boston and in Salt Lake City, where police say personal information of confidential informants and tipsters was accessed.",http://www.washingtontimes.com/news/2012/feb/5/hackers-attack-law-enforcement-websites/,2/3/2012,Unknown,Unknown,Leakage of Information,Law Enforcement,Virginia,Unknown,NA,1,Unknown,,,,,
-2012-21,WHID 2012-21: Hackers attack law enforcement websites,"Saboteurs have hacked into the websites of several law enforcement agencies worldwide in attacks attributed to the collective called Anonymous, including in Boston and in Salt Lake City, where police say personal information of confidential informants and tipsters was accessed.",http://www.washingtontimes.com/news/2012/feb/5/hackers-attack-law-enforcement-websites/,2/3/2012,Unknown,Unknown,Leakage of Information,Law Enforcement,Virginia,Unknown,NA,1,Unknown,,,,,
-2012-220,WHID 2012-220: CIA site downed as Anonymous claims attack,The CIA website is now back online following a DDoS attack reportedly perpetrated by the hacktivist group Anonymous. This is the latest attack in a series of assaults carried out against US government websites.,https://rt.com/news/cia-site-claims-attack-807/,4/24/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Langley, Virginia",Yes,Anonymous,,,,,,,
-2012-220,WHID 2012-220: CIA site downed as Anonymous claims attack,The CIA website is now back online following a DDoS attack reportedly perpetrated by the hacktivist group Anonymous. This is the latest attack in a series of assaults carried out against US government websites.,https://rt.com/news/cia-site-claims-attack-807/,4/24/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Langley, Virginia",Yes,Anonymous,,,,,,,
-2012-221,WHID 2012-221: Local bank website hacked,"The bank executive said that they believe it was the work of an automated hacking tool that simply swapped their home page with the image that Grech saw. Management contends it was purely superficial and at no time were customer accounts at risk, putting some worries at ease.",http://wtvr.com/2012/04/23/local-bank-website-hacked/,4/23/2012,Unknown,Unknown,Defacement,Finance,"Richmond, VA",,,,,,,,,
-2012-221,WHID 2012-221: Local bank website hacked,"The bank executive said that they believe it was the work of an automated hacking tool that simply swapped their home page with the image that Grech saw. Management contends it was purely superficial and at no time were customer accounts at risk, putting some worries at ease.",http://wtvr.com/2012/04/23/local-bank-website-hacked/,4/23/2012,Unknown,Unknown,Defacement,Finance,"Richmond, VA",,,,,,,,,
-2012-222,WHID 2012-222: DBM website hacked,Purported Chinese hackers attacked the website of the Department of Budget and Management (DBM) on Wednesday.,http://www.abs-cbnnews.com/nation/04/25/12/dbm-website-hacked,4/25/2012,Unknown,Unknown,Defacement,Government,"Manila, Philippines",,,,,,,,,
-2012-222,WHID 2012-222: DBM website hacked,Purported Chinese hackers attacked the website of the Department of Budget and Management (DBM) on Wednesday.,http://www.abs-cbnnews.com/nation/04/25/12/dbm-website-hacked,4/25/2012,Unknown,Unknown,Defacement,Government,"Manila, Philippines",,,,,,,,,
-2012-223,WHID 2012-223: UK2.NET smashed offline by '10-million-strong' botnet,British web hosting outfit UK2.NET was on the business end of a distributed denial-of-service attack last night that took down customers' websites.,http://www.theregister.co.uk/2012/04/26/uk2net_outage_in_ddos_attack/,4/26/2012,Denial of Service,Insufficient Anti-automation,Downtime,Hosting Providers,UK,Yes,,,,,,,,
-2012-223,WHID 2012-223: UK2.NET smashed offline by '10-million-strong' botnet,British web hosting outfit UK2.NET was on the business end of a distributed denial-of-service attack last night that took down customers' websites.,http://www.theregister.co.uk/2012/04/26/uk2net_outage_in_ddos_attack/,4/26/2012,Denial of Service,Insufficient Anti-automation,Downtime,Hosting Providers,UK,Yes,,,,,,,,
-2012-224,WHID 2012-224: The Man Who Hacked Hollywood,Describes how Chris Chaney used brute force techniques to gain access to celebrity email accounts.,http://www.gq.com/news-politics/newsmakers/201205/chris-chaney-hacker-nude-photos-scarlett-johansson?printable=true,4/26/2012,Brute Force,Insufficient Password Recovery,Leakage of Information,Service Providers,Multiple,,,,,,,,,
-2012-224,WHID 2012-224: The Man Who Hacked Hollywood,Describes how Chris Chaney used brute force techniques to gain access to celebrity email accounts.,http://www.gq.com/news-politics/newsmakers/201205/chris-chaney-hacker-nude-photos-scarlett-johansson?printable=true,4/26/2012,Brute Force,Insufficient Password Recovery,Leakage of Information,Service Providers,Multiple,,,,,,,,,
-2012-225,WHID 2012-225: Taliban Website Hacked As Afghan Cyberwar Heats Up,"Unidentified hackers have broken into the main website of the Afghan Taliban, replacing the usual militant claims of victories with images of executions carried out by the militants and messages condemning violence in English, Arabic, and Pashto.",http://www.rferl.org/content/taliban_website_hacked/24562004.html,4/26/2012,Unknown,Unknown,Defacement,Political Group,Afghanistan,No,NA,1,Unknown,Apache,Unknown,None,NA,
-2012-225,WHID 2012-225: Taliban Website Hacked As Afghan Cyberwar Heats Up,"Unidentified hackers have broken into the main website of the Afghan Taliban, replacing the usual militant claims of victories with images of executions carried out by the militants and messages condemning violence in English, Arabic, and Pashto.",http://www.rferl.org/content/taliban_website_hacked/24562004.html,4/26/2012,Unknown,Unknown,Defacement,Political Group,Afghanistan,No,NA,1,Unknown,Apache,Unknown,None,NA,
-2012-226,WHID 2012-226: Philippines DBM site defaced,"The website of the Philippines Department of Budget and Management was defaced Wednesday afternoon and was quickly taken down for a ""security audit"".",http://www.gmanetwork.com/news/story/256173/scitech/technology/dbm-site-defaced-other-govt-sites-down,4/25/2012,Unknown,Unknown,Defacement,Government,Philippines,No,NA,1,China,Drupal,Unknown,None,NA,
-2012-226,WHID 2012-226: Philippines DBM site defaced,"The website of the Philippines Department of Budget and Management was defaced Wednesday afternoon and was quickly taken down for a ""security audit"".",http://www.gmanetwork.com/news/story/256173/scitech/technology/dbm-site-defaced-other-govt-sites-down,4/25/2012,Unknown,Unknown,Defacement,Government,Philippines,No,NA,1,China,Drupal,Unknown,None,NA,
-2012-227,WHID 2012-227: Confidential information released in Lake County Sheriff's website hacking,"Lake County sheriff's deputies have launched an investigation into how its computer system was hacked, which forced officials to shut down all electronic communication and Internet.",http://www.clickorlando.com/news/Lake-County-Sheriff-s-Office-website-hacked-over-weekend/-/1637132/12246044/-/7j5xot/-/,4/27/2012,Unknown,Unknown,Leakage of Information,Law enforcement,"Lake County,Florida",No,NA,1,Unknown,Unknown,Unknown,Email addresses and passwords,250+,
-2012-227,WHID 2012-227: Confidential information released in Lake County Sheriff's website hacking,"Lake County sheriff's deputies have launched an investigation into how its computer system was hacked, which forced officials to shut down all electronic communication and Internet.",http://www.clickorlando.com/news/Lake-County-Sheriff-s-Office-website-hacked-over-weekend/-/1637132/12246044/-/7j5xot/-/,4/27/2012,Unknown,Unknown,Leakage of Information,Law enforcement,"Lake County,Florida",No,NA,1,Unknown,Unknown,Unknown,Email addresses and passwords,250+,
-2012-228,WHID 2012-228: SOCA Website Downed By DDoS Attack,"The website of the Serious Organised Crime Agency, SOCA, has been hit by a distributed-denial-of-service attack.",http://www.itproportal.com/2012/05/04/soca-website-downed-by-ddos-attack/,5/2/2012,Denial of Service,Unknown,Downtime,Law enforcement,United Kingdom,Yes,Distributed Denial of Service attack,1,Unknown,Apache,Unknown,None,NA,
-2012-228,WHID 2012-228: SOCA Website Downed By DDoS Attack,"The website of the Serious Organised Crime Agency, SOCA, has been hit by a distributed-denial-of-service attack.",http://www.itproportal.com/2012/05/04/soca-website-downed-by-ddos-attack/,5/2/2012,Denial of Service,Unknown,Downtime,Law enforcement,United Kingdom,Yes,Distributed Denial of Service attack,1,Unknown,Apache,Unknown,None,NA,
-2012-229,"WHID 2012-229: ANCYL website hacked, league responds",ANCYL website was defaced.,http://mybroadband.co.za/news/security/49043-ancyl-website-hacked-league-responds.html,5/2/2012,Unknown,Unknown,Defacement,Youth organization,Africa,No,NA,1,Unknown,Apache,Unknown,None,NA,
-2012-229,"WHID 2012-229: ANCYL website hacked, league responds",ANCYL website was defaced.,http://mybroadband.co.za/news/security/49043-ancyl-website-hacked-league-responds.html,5/2/2012,Unknown,Unknown,Defacement,Youth organization,Africa,No,NA,1,Unknown,Apache,Unknown,None,NA,
-2012-22,WHID 2012-22: Irish Aid website 'hacked',"The website of the Government???s overseas development programme, Irish Aid was taken down for a time last night after the email addresses and passwords of staff were posted online.",http://www.irishtimes.com/newspaper/breaking/2012/0202/breaking6.html,2/1/2012,Unknown,Unknown,Leakage of Information,Government,Ireland,Unreported,NA,1,Sweden,Unreported,Unreported,Email addresses and passwords,Unreported,
-2012-22,WHID 2012-22: Irish Aid website 'hacked',"The website of the Government???s overseas development programme, Irish Aid was taken down for a time last night after the email addresses and passwords of staff were posted online.",http://www.irishtimes.com/newspaper/breaking/2012/0202/breaking6.html,2/1/2012,Unknown,Unknown,Leakage of Information,Government,Ireland,Unreported,NA,1,Sweden,Unreported,Unreported,Email addresses and passwords,Unreported,
-2012-230,"WHID 2012-230: Three Rivers Park District Website Hacked, Credit Card Information Safe",The Three Rivers Park District online reservation system was the target of a cyber attack.,http://kaaltv.com/article/stories/S2603448.shtml?cat=10728,4/19/2012,Information leakage,Unknown,Leakage of Information,State Park,"Minneapolis, Minnesota",No,Information leakage,1,Unknown,IIS 6.0,Unknown,Yes,"log-in names and passwords of 86,000 customers",
-2012-230,"WHID 2012-230: Three Rivers Park District Website Hacked, Credit Card Information Safe",The Three Rivers Park District online reservation system was the target of a cyber attack.,http://kaaltv.com/article/stories/S2603448.shtml?cat=10728,4/19/2012,Information leakage,Unknown,Leakage of Information,State Park,"Minneapolis, Minnesota",No,Information leakage,1,Unknown,IIS 6.0,Unknown,Yes,"log-in names and passwords of 86,000 customers",
-2012-231,WHID 2012-231: Philippine Star's website hacked,The website of national newspaper Philippine Star was hacked.,http://www.abs-cbnnews.com/nation/05/04/12/philippine-stars-website-hacked,5/4/2012,Unknown,Unknown,Defacement,Newspaper media,Phillipines,No,NA,1,Unknown,IIS 6.0/ ASP .NET,Unknown,None,NA,
-2012-231,WHID 2012-231: Philippine Star's website hacked,The website of national newspaper Philippine Star was hacked.,http://www.abs-cbnnews.com/nation/05/04/12/philippine-stars-website-hacked,5/4/2012,Unknown,Unknown,Defacement,Newspaper media,Phillipines,No,NA,1,Unknown,IIS 6.0/ ASP .NET,Unknown,None,NA,
-2012-232,WHID 2012-232: 'Unknowns' hack European Space Agency,The European Space Agency has said that a group of hackers called 'The Unknowns' successfully hacked into external servers and got access to user identity information.,http://www.zdnet.co.uk/blogs/security-bulletin-10000166/unknowns-hack-european-space-agency-10026071/,5/3/2012,SQL Injection,Improper Input Handling,Leakage of Information,Space Agency,"Paris, France",No,NA,1,Unknown,Unknown,Unknown,User names,Unknown,
-2012-232,WHID 2012-232: 'Unknowns' hack European Space Agency,The European Space Agency has said that a group of hackers called 'The Unknowns' successfully hacked into external servers and got access to user identity information.,http://www.zdnet.co.uk/blogs/security-bulletin-10000166/unknowns-hack-european-space-agency-10026071/,5/3/2012,SQL Injection,Improper Input Handling,Leakage of Information,Space Agency,"Paris, France",No,NA,1,Unknown,Unknown,Unknown,User names,Unknown,
-2012-233,"WHID 2012-231: Anonymous Hackers Target CIA, UK Supreme Court Over ???Pirate Bay??? Censorship","Hacktivist members of the online collective called ""Anonymous"" targeted the websites of the United Kingdom Supreme Court and the CIA.",http://www.ibtimes.com/articles/337473/20120504/anonymous-hackers-cispa-cia-supreme-court-optpb.htm,5/4/2012,Denial of Service,Unknown,Downtime,Government,United States and United Kingdom,Yes,Dynamic Denial of Service,2+,Unknown,Unknown,None,None,NA,
-2012-233,"WHID 2012-231: Anonymous Hackers Target CIA, UK Supreme Court Over ???Pirate Bay??? Censorship","Hacktivist members of the online collective called ""Anonymous"" targeted the websites of the United Kingdom Supreme Court and the CIA.",http://www.ibtimes.com/articles/337473/20120504/anonymous-hackers-cispa-cia-supreme-court-optpb.htm,5/4/2012,Denial of Service,Unknown,Downtime,Government,United States and United Kingdom,Yes,Dynamic Denial of Service,2+,Unknown,Unknown,None,None,NA,
-2012-234,2012-234: PAGASA website hacked,"The Philippine Atmospheric, Geophysical and Astronomical Services Administration (PAGASA) website was hacked.",http://www.abs-cbnnews.com/nation/05/09/12/pagasa-website-hacked,5/9/2012,Unknown,Unknown,Defacement,Science,Philipines,No,NA,1,China,Unknown,Unknown,None,NA,
-2012-234,2012-234: PAGASA website hacked,"The Philippine Atmospheric, Geophysical and Astronomical Services Administration (PAGASA) website was hacked.",http://www.abs-cbnnews.com/nation/05/09/12/pagasa-website-hacked,5/9/2012,Unknown,Unknown,Defacement,Science,Philipines,No,NA,1,China,Unknown,Unknown,None,NA,
-2012-235,WHID 2012-235: Activist hackers temporarily block Putin's website,Hackers temporarily blocked President Vladimir Putin's web site,http://www.reuters.com/article/2012/05/09/us-russia-hackers-kremlin-idUSBRE8480L020120509,5/9/2012,Denial of Service,Unknown,Downtime,Government,Russia,Yes,Denial of Service,1,Unkknown,nginx,Unknown,None,NA,
-2012-235,WHID 2012-235: Activist hackers temporarily block Putin's website,Hackers temporarily blocked President Vladimir Putin's web site,http://www.reuters.com/article/2012/05/09/us-russia-hackers-kremlin-idUSBRE8480L020120509,5/9/2012,Denial of Service,Unknown,Downtime,Government,Russia,Yes,Denial of Service,1,Unkknown,nginx,Unknown,None,NA,
-2012-236,"WHID 2012-236: 4Chan vandalises Tea Party website, reveals private donors",The Tea Party has had its PAC website hacked by what looks like a legion of users from the notorious 4Chan image board.,http://news.techeye.net/internet/4chan-vandalises-tea-party-website-reveals-private-donors,5/11/2012,Account compromise,Weak password,Defacement,American political movement,United States,No,NA,1,Unknown,Unknown,Unknown,Password,1,
-2012-236,"WHID 2012-236: 4Chan vandalises Tea Party website, reveals private donors",The Tea Party has had its PAC website hacked by what looks like a legion of users from the notorious 4Chan image board.,http://news.techeye.net/internet/4chan-vandalises-tea-party-website-reveals-private-donors,5/11/2012,Account compromise,Weak password,Defacement,American political movement,United States,No,NA,1,Unknown,Unknown,Unknown,Password,1,
-2012-237,WHID 2012-237: Amnesty UK website hacked to serve lethal Gh0st RAT Trojan,Amnesty International's UK website was hacked to host the dangerous Gh0st RAT Trojan for two days.,http://news.idg.no/cw/art.cfm?id=8D5B5FA7-FBEE-927B-4C5DADA27F1AE4AD,5/11/2012,Hosting malicious code,Unknown,Planting of Malware,Human Rights,United Kingdom,No,NA,1,Unknown,ASP.NET,Unknown,None,NA,
-2012-237,WHID 2012-237: Amnesty UK website hacked to serve lethal Gh0st RAT Trojan,Amnesty International's UK website was hacked to host the dangerous Gh0st RAT Trojan for two days.,http://news.idg.no/cw/art.cfm?id=8D5B5FA7-FBEE-927B-4C5DADA27F1AE4AD,5/11/2012,Hosting malicious code,Unknown,Planting of Malware,Human Rights,United Kingdom,No,NA,1,Unknown,ASP.NET,Unknown,None,NA,
-2012-238,WHID 2012-238: ICO blasted offline by DDoS cannon in Leveson protest,The UK's Information Commissioner's Office website has been blown offline by a distributed-denial-of-service attack that appears to be a hacktivist protest over the Leveson Inquiry.,http://www.theregister.co.uk/2012/05/15/ico_downed_by_ddos_leveson/,5/15/2012,Denial of Service,Unknown,Downtime,Information Rights,United Kingdom,Unknown,NA,1,Unknown,IIS 7,Unknown,Unknown,NA,
-2012-238,WHID 2012-238: ICO blasted offline by DDoS cannon in Leveson protest,The UK's Information Commissioner's Office website has been blown offline by a distributed-denial-of-service attack that appears to be a hacktivist protest over the Leveson Inquiry.,http://www.theregister.co.uk/2012/05/15/ico_downed_by_ddos_leveson/,5/15/2012,Denial of Service,Unknown,Downtime,Information Rights,United Kingdom,Unknown,NA,1,Unknown,IIS 7,Unknown,Unknown,NA,
-2012-239,WHID 2012-239: Pirate Bay Under DDoS Attack From Unknown Enemy,"After the site openly criticized Anonymous last week for DDoS???ing UK ISP Virgin Media, The Pirate Bay itself is now under attack.",http://torrentfreak.com/pirate-bay-under-ddos-attack-from-unknown-enemy-120516/,5/16/2012,Denial of Service,Unknown,Downtime,Media web site,United Kingdom,Yes,DDoS,1,Unknown,lighttpd/ PHP,Unknown,None,NA,
-2012-239,WHID 2012-239: Pirate Bay Under DDoS Attack From Unknown Enemy,"After the site openly criticized Anonymous last week for DDoS???ing UK ISP Virgin Media, The Pirate Bay itself is now under attack.",http://torrentfreak.com/pirate-bay-under-ddos-attack-from-unknown-enemy-120516/,5/16/2012,Denial of Service,Unknown,Downtime,Media web site,United Kingdom,Yes,DDoS,1,Unknown,lighttpd/ PHP,Unknown,None,NA,
-2012-23,WHID 2012-23: Anonymous hackers access Greek ministry website,"Hackers associated with the activist group Anonymous posted a protest against Greece's EU and IMF-inspired austerity policies on the website of the country's justice ministry Friday, a ministry spokeswoman said.",http://www.reuters.com/article/2012/02/03/us-greece-hackers-idUSTRE8120D320120203,2/3/2012,Unknown,Unknown,Defacement,Government,Greece,Unreported,NA,1,Unreported,Unreported,Unreported,None,None,
-2012-23,WHID 2012-23: Anonymous hackers access Greek ministry website,"Hackers associated with the activist group Anonymous posted a protest against Greece's EU and IMF-inspired austerity policies on the website of the country's justice ministry Friday, a ministry spokeswoman said.",http://www.reuters.com/article/2012/02/03/us-greece-hackers-idUSTRE8120D320120203,2/3/2012,Unknown,Unknown,Defacement,Government,Greece,Unreported,NA,1,Unreported,Unreported,Unreported,None,None,
-2012-240,WHID 2012-240: Popular Eurovision website hacked in response to ???parade of homosexuals???,A group is reportedly targeting websites related to the Eurovision Song Contest in Azerbaijan in protest at a ???parade of homosexuals??? it believes will take place at the event.,http://www.pinknews.co.uk/2012/05/17/popular-eurovision-website-hacked-in-response-to-parade-of-homosexuals/,5/17/2012,Denial of Service,Unknown,Downtime,News,Australia,No,NA,1,Unknown,PleskLin,Unknown,None,NA,
-2012-240,WHID 2012-240: Popular Eurovision website hacked in response to ???parade of homosexuals???,A group is reportedly targeting websites related to the Eurovision Song Contest in Azerbaijan in protest at a ???parade of homosexuals??? it believes will take place at the event.,http://www.pinknews.co.uk/2012/05/17/popular-eurovision-website-hacked-in-response-to-parade-of-homosexuals/,5/17/2012,Denial of Service,Unknown,Downtime,News,Australia,No,NA,1,Unknown,PleskLin,Unknown,None,NA,
-2012-241,WHID 2012-241: Basketball TV website hacked,"The official website of local cable channel Basketball TV was compromised today, May 18, by hackers claiming to be Chinese.",http://www.rappler.com/nation/5582-btv-website-hacked,5/18/2012,Unknown,Unknown,Defacement,Sports,Phillipines,No,NA,1,China,Apache/ PHP,Unknown,Unknown,NA,
-2012-241,WHID 2012-241: Basketball TV website hacked,"The official website of local cable channel Basketball TV was compromised today, May 18, by hackers claiming to be Chinese.",http://www.rappler.com/nation/5582-btv-website-hacked,5/18/2012,Unknown,Unknown,Defacement,Sports,Phillipines,No,NA,1,China,Apache/ PHP,Unknown,Unknown,NA,
-2012-242,WHID 2012-242: Anonymous Launches Cyberattacks Against India,"Websites belonging to India???s Supreme Court, the Ministry of Communications and Information Technology, the Department of Telecommunications, and both of the nation???s political parties were targets of an Anonymous-led hacking attack.",http://www.redorbit.com/news/technology/1112538563/anonymous-launches-cyberattacks-against-india/,5/18/2012,Denial of Service,Unknown,Downtime,Government,India,Yes,Distributed denial of service,6+,Unknown,Unknown,Unknown,Unknown,NA,
-2012-242,WHID 2012-242: Anonymous Launches Cyberattacks Against India,"Websites belonging to India???s Supreme Court, the Ministry of Communications and Information Technology, the Department of Telecommunications, and both of the nation???s political parties were targets of an Anonymous-led hacking attack.",http://www.redorbit.com/news/technology/1112538563/anonymous-launches-cyberattacks-against-india/,5/18/2012,Denial of Service,Unknown,Downtime,Government,India,Yes,Distributed denial of service,6+,Unknown,Unknown,Unknown,Unknown,NA,
-2012-243,WHID 2012-243: Anonymous Hackers Claim to Take Down Chicago Police Website,"The Chicago Police Department website is down, and ???hactivists??? from the group Anonymous are taking credit.",http://mashable.com/2012/05/20/anonymous-hackers-police-website/,5/20/2012,Denial of Service,Unknown,Downtime,Law enforcement,Chicago,Yes,Distributed denial of service,1,Unknown,Apache,Unknown,None,NA,
-2012-243,WHID 2012-243: Anonymous Hackers Claim to Take Down Chicago Police Website,"The Chicago Police Department website is down, and ???hactivists??? from the group Anonymous are taking credit.",http://mashable.com/2012/05/20/anonymous-hackers-police-website/,5/20/2012,Denial of Service,Unknown,Downtime,Law enforcement,Chicago,Yes,Distributed denial of service,1,Unknown,Apache,Unknown,None,NA,
-2012-244,WHID 2012-244: Anonymous takes out Indian CERT as attacks continue,Hacktivist group Anonymous continued its attacks on the Indian government and creative industries.,http://www.theregister.co.uk/2012/05/21/india_anonymous_cert_ddos/,5/20/2012,Denial of Service,Unknown,Downtime,Government,India,Yes,Distributed denial of service,4+,Unknown,Unknown,Unknown,Unknown,NA,
-2012-244,WHID 2012-244: Anonymous takes out Indian CERT as attacks continue,Hacktivist group Anonymous continued its attacks on the Indian government and creative industries.,http://www.theregister.co.uk/2012/05/21/india_anonymous_cert_ddos/,5/20/2012,Denial of Service,Unknown,Downtime,Government,India,Yes,Distributed denial of service,4+,Unknown,Unknown,Unknown,Unknown,NA,
-2012-245,WHID 2012-245: Solar Impulse website hacked,The team of the Swiss airplane Solar Impulse warns its supporters that its website was hacked,http://worldradio.ch/wrs/news/wrsnews/solar-impulse-website-hacked.shtml?30729,5/21/2012,Unknown,Unknown,Defacement,Solar flight,Sitzerland,No,NA,1,Unknown,Apache,Unknown,None,NA,
-2012-245,WHID 2012-245: Solar Impulse website hacked,The team of the Swiss airplane Solar Impulse warns its supporters that its website was hacked,http://worldradio.ch/wrs/news/wrsnews/solar-impulse-website-hacked.shtml?30729,5/21/2012,Unknown,Unknown,Defacement,Solar flight,Sitzerland,No,NA,1,Unknown,Apache,Unknown,None,NA,
-2012-246,WHID 2012-246: Web Hosting Control Panel WHMCS Hit by DDoS and Social Engineering Attack,WHMCS experienced a DDoS and social engineering attack this week,http://www.thewhir.com/web-hosting-news/web-hosting-control-panel-whmcs-hit-by-ddos-and-social-engineering-attack,5/22/2012,Denial of Service,Unknown,Downtime,Client management,United Kingdom,Yes,Denial of service,1,Unknown,Apache,Unknown,Yes,Unknown,
-2012-246,WHID 2012-246: Web Hosting Control Panel WHMCS Hit by DDoS and Social Engineering Attack,WHMCS experienced a DDoS and social engineering attack this week,http://www.thewhir.com/web-hosting-news/web-hosting-control-panel-whmcs-hit-by-ddos-and-social-engineering-attack,5/22/2012,Denial of Service,Unknown,Downtime,Client management,United Kingdom,Yes,Denial of service,1,Unknown,Apache,Unknown,Yes,Unknown,
-2012-247,WHID 2012-247:123-reg outtage caused by DDoS attack from China,It appears that 123-reg are having some network problems caused by a distributed denial of service attack from China.,http://tamebay.com/2012/05/123-reg-outtage-caused-by-ddos-attack-from-china.html,5/23/2012,Denial of Service,Unknown,Downtime,Web site hosting,United Kingdom,Yes,Distributed denial of service attack,Unknown,China,Apache,Unknown,None,NA,
-2012-247,WHID 2012-247:123-reg outtage caused by DDoS attack from China,It appears that 123-reg are having some network problems caused by a distributed denial of service attack from China.,http://tamebay.com/2012/05/123-reg-outtage-caused-by-ddos-attack-from-china.html,5/23/2012,Denial of Service,Unknown,Downtime,Web site hosting,United Kingdom,Yes,Distributed denial of service attack,Unknown,China,Apache,Unknown,None,NA,
-2012-248,"WHID 2012-248: Yemeni tribal website hacked by US, divulges Hilary Clinton","US Secretary of State Hilary Clinton admitted that cyber experts based at her department hacked Yemeni tribal websites, and tracked messages about killing Americans.",http://www.globalnewsdesk.co.uk/north-america/us-hacking-al-qaeda/0992/,5/24/2012,Unknown,Unknown,Defacement,Government,Yemin,No,Site defacement,Unknown,United States,Unknown,Unknown,Unknown,Unknown,
-2012-248,"WHID 2012-248: Yemeni tribal website hacked by US, divulges Hilary Clinton","US Secretary of State Hilary Clinton admitted that cyber experts based at her department hacked Yemeni tribal websites, and tracked messages about killing Americans.",http://www.globalnewsdesk.co.uk/north-america/us-hacking-al-qaeda/0992/,5/24/2012,Unknown,Unknown,Defacement,Government,Yemin,No,Site defacement,Unknown,United States,Unknown,Unknown,Unknown,Unknown,
-2012-249,WHID 2012-249: Agriboffins' site downed by DDoS after GM protest,Agricultural research institute Rothamsted Research was pulled offline in a DDoS attack just hours after police stopped protestors destroying a GM crop trial at the facility.,http://www.theregister.co.uk/2012/05/28/rothamsted_site_down_ddos/,5/28/2012,Denial of Service,Unknown,Downtime,Agriculture research,United Kingdom,Yes,Distributed denial of service,1,Unknown,Apache/ PHP,Unknown,None,NA,
-2012-249,WHID 2012-249: Agriboffins' site downed by DDoS after GM protest,Agricultural research institute Rothamsted Research was pulled offline in a DDoS attack just hours after police stopped protestors destroying a GM crop trial at the facility.,http://www.theregister.co.uk/2012/05/28/rothamsted_site_down_ddos/,5/28/2012,Denial of Service,Unknown,Downtime,Agriculture research,United Kingdom,Yes,Distributed denial of service,1,Unknown,Apache/ PHP,Unknown,None,NA,
-2012-24,WHID 2012-24: More fallout; Salt Lake City police website hacked,The Salt Lake City police department is asking their tipsters and informants to be careful after a hacker compromised their website,http://www.abc4.com/content/news/slc/story/More-fallout-Salt-Lake-City-police-website-hacked/PiSspE768UiioitJ3K4gyQ.cspx,2/1/2012,SQL Injection,Improper Input Handling,Leakage of Information,Law Enforcement,"Salt Lake City, Utah",Non,NA,1,Unreported,Unreported,Unreported,Unreported,Unreported,
-2012-24,WHID 2012-24: More fallout; Salt Lake City police website hacked,The Salt Lake City police department is asking their tipsters and informants to be careful after a hacker compromised their website,http://www.abc4.com/content/news/slc/story/More-fallout-Salt-Lake-City-police-website-hacked/PiSspE768UiioitJ3K4gyQ.cspx,2/1/2012,SQL Injection,Improper Input Handling,Leakage of Information,Law Enforcement,"Salt Lake City, Utah",Non,NA,1,Unreported,Unreported,Unreported,Unreported,Unreported,
-2012-250,WHID 2012-250: Just like the share price... Facebook goes down after being 'hacked by Anonymous',Facebook experienced service outages for portions of its 900 million users tonight after the social networking site was apparently targeted by hacking group Anonymous.,http://www.dailymail.co.uk/sciencetech/article-2153081/Facebook-goes-just-like-share-price--Social-networking-giant-caps-end-week-forget-website-outages-apparently-hacked-Anonymous.html,6/1/2012,Denial of Service,Insufficient Anti-automation,Downtime,Social Networking,United States,Yes,Distributed denial of service,1,Unknown,Unknown,Unknown,None,NA,
-2012-250,WHID 2012-250: Just like the share price... Facebook goes down after being 'hacked by Anonymous',Facebook experienced service outages for portions of its 900 million users tonight after the social networking site was apparently targeted by hacking group Anonymous.,http://www.dailymail.co.uk/sciencetech/article-2153081/Facebook-goes-just-like-share-price--Social-networking-giant-caps-end-week-forget-website-outages-apparently-hacked-Anonymous.html,6/1/2012,Denial of Service,Insufficient Anti-automation,Downtime,Social Networking,United States,Yes,Distributed denial of service,1,Unknown,Unknown,Unknown,None,NA,
-2012-251,WHID 2012-251: Quick fix for Hotmail password bug,"The bug allowed a hacker to reset the password for a Hotmail account, locking out its owner and giving the attacker access to the inbox. The fix was put together because the bug was starting to be actively exploited online.",http://www.bbc.co.uk/news/technology-17866897,4/27/2012,Parameter Manipulation,Insufficient Password Recovery,Account Takeover,Service Providers,,,,,,,,,,
-2012-251,WHID 2012-251: Quick fix for Hotmail password bug,"The bug allowed a hacker to reset the password for a Hotmail account, locking out its owner and giving the attacker access to the inbox. The fix was put together because the bug was starting to be actively exploited online.",http://www.bbc.co.uk/news/technology-17866897,4/27/2012,Parameter Manipulation,Insufficient Password Recovery,Account Takeover,Service Providers,,,,,,,,,,
-2012-252,WHID 2012-252: Hosting firm suffers 'innocent' intrusion after billing system hacked,"Web-hosting firm eUKHost has been hacked by Pakistani hacking team UrduHack, which appeared to have gained access to its billing system.",http://www.theregister.co.uk/2012/04/30/eukhost_billing_system_compromise/,4/30/2012,Unknown,Unknown,Leakage of Information,Hosting Provider,,,,,,,,,,
-2012-252,WHID 2012-252: Hosting firm suffers 'innocent' intrusion after billing system hacked,"Web-hosting firm eUKHost has been hacked by Pakistani hacking team UrduHack, which appeared to have gained access to its billing system.",http://www.theregister.co.uk/2012/04/30/eukhost_billing_system_compromise/,4/30/2012,Unknown,Unknown,Leakage of Information,Hosting Provider,,,,,,,,,,
-2012-253,WHID 2012-253: Cyber watchdog website hacked,"Even after a series of government defacements by Anonymous, the website of the Indian Computer Emergency Response Team website was trolled and defaced by by Anonymous.",http://www.deccanchronicle.com/channels/cities/hyderabad/cyber-watchdog-website-hacked-988,6/2/2012,Unknown,Unknown,Downtime,Government,India,No,Defacement,1,Unknown,Unknown,Unknown,None,NA,
-2012-253,WHID 2012-253: Cyber watchdog website hacked,"Even after a series of government defacements by Anonymous, the website of the Indian Computer Emergency Response Team website was trolled and defaced by by Anonymous.",http://www.deccanchronicle.com/channels/cities/hyderabad/cyber-watchdog-website-hacked-988,6/2/2012,Unknown,Unknown,Downtime,Government,India,No,Defacement,1,Unknown,Unknown,Unknown,None,NA,
-2012-254,WHID 2012-254: DigiCape website hacked,"Independent Apple retailer DigiCape is the victim of a cyber attack, with the company's website hacked.",http://technology.iafrica.com/news/technology/798318.html,6/4/2012,Unknown,Unknown,Defacement,Online retail,South Africa,No,NA,1,Unknown,PHP and Apache,Unknown,Unknown,NA,
-2012-254,WHID 2012-254: DigiCape website hacked,"Independent Apple retailer DigiCape is the victim of a cyber attack, with the company's website hacked.",http://technology.iafrica.com/news/technology/798318.html,6/4/2012,Unknown,Unknown,Defacement,Online retail,South Africa,No,NA,1,Unknown,PHP and Apache,Unknown,Unknown,NA,
-2012-255,WHID 2012-255: Indian ISPs Targeted in Anonymous Censorship Protest,The websites of Indian government-run communications company Mahanagar Telephone Nigam and the Internet Service Providers Association of India faced DDoS (distributed denial of service) attacks from Anonymous.,http://www.pcworld.com/businesscenter/article/257032/indian_isps_targeted_in_anonymous_censorship_protest.html,6/6/2012,Denial of Service,Insufficient Anti-automation,Downtime,Internet Service Provider,India,Yes,Distributed Denial of Service,2+,Unknown,Unknown,Unknown,No,NA,
-2012-255,WHID 2012-255: Indian ISPs Targeted in Anonymous Censorship Protest,The websites of Indian government-run communications company Mahanagar Telephone Nigam and the Internet Service Providers Association of India faced DDoS (distributed denial of service) attacks from Anonymous.,http://www.pcworld.com/businesscenter/article/257032/indian_isps_targeted_in_anonymous_censorship_protest.html,6/6/2012,Denial of Service,Insufficient Anti-automation,Downtime,Internet Service Provider,India,Yes,Distributed Denial of Service,2+,Unknown,Unknown,Unknown,No,NA,
-2012-256,"WHID 2012-256: Defence, Panasonic hacked and defaced","One of the Defence Materiel Organisation's (DMO) websites has been compromised by hackers, while Panasonic Australia has taken its website down after one of its subdomains was also hacked and then defaced.",http://www.zdnet.com/defence-panasonic-hacked-and-defaced-1339339331/,6/7/2012,Unknown,Unknown,Defacement,Australian Department of Defense,Australia,No,NA,1,Unknown,ASP.NET/ IIS 6.0,Unknown,Unknown,NA,
-2012-256,"WHID 2012-256: Defence, Panasonic hacked and defaced","One of the Defence Materiel Organisation's (DMO) websites has been compromised by hackers, while Panasonic Australia has taken its website down after one of its subdomains was also hacked and then defaced.",http://www.zdnet.com/defence-panasonic-hacked-and-defaced-1339339331/,6/7/2012,Unknown,Unknown,Defacement,Australian Department of Defense,Australia,No,NA,1,Unknown,ASP.NET/ IIS 6.0,Unknown,Unknown,NA,
-2012-257,"WHID 2012-257: UMass website hacked, Google searchers get offer to sell Viagra",A lot of people who did a Google search for UMass Amherst Wednesday morning found themselves with a bitter pill to swallow -- and it wasn't blue.,http://www.masslive.com/business-news/index.ssf/2012/06/umass_website_hacked_google_searchers_ge.html,6/6/2012,Search Engine Poisoning,Improper Output Handling,Spam,United States University,Massachusetts,No,NA,1,Unknown,Drupal 7,Unknown,Unknown,NA,
-2012-257,"WHID 2012-257: UMass website hacked, Google searchers get offer to sell Viagra",A lot of people who did a Google search for UMass Amherst Wednesday morning found themselves with a bitter pill to swallow -- and it wasn't blue.,http://www.masslive.com/business-news/index.ssf/2012/06/umass_website_hacked_google_searchers_ge.html,6/6/2012,Search Engine Poisoning,Improper Output Handling,Spam,United States University,Massachusetts,No,NA,1,Unknown,Drupal 7,Unknown,Unknown,NA,
-2012-258,WHID 2012-258: 6.5 Million LinkedIn Passwords May Be In Hands of Hackers,LinkedIn on Wednesday morning was still unable to confirm reports that 6.5 million user passwords had been exposed. But Sophos has discovered LinkedIn password information posted on a Russian hacker site.,http://www.newsfactor.com/news/6-5M-LinkedIn-Passwords-May-Be-Stolen/story.xhtml?story_id=013000G54XRY,6/6/2012,SQL Injection,Unknown,Leakage of Information,Social Networking,"Mountain View, CA",No,NA,1,Unknown,Apache-Coyote/1.1,Unknown,Passwords,6.5 million,
-2012-258,WHID 2012-258: 6.5 Million LinkedIn Passwords May Be In Hands of Hackers,LinkedIn on Wednesday morning was still unable to confirm reports that 6.5 million user passwords had been exposed. But Sophos has discovered LinkedIn password information posted on a Russian hacker site.,http://www.newsfactor.com/news/6-5M-LinkedIn-Passwords-May-Be-Stolen/story.xhtml?story_id=013000G54XRY,6/6/2012,SQL Injection,Unknown,Leakage of Information,Social Networking,"Mountain View, CA",No,NA,1,Unknown,Apache-Coyote/1.1,Unknown,Passwords,6.5 million,
-2012-259,WHID 2012-259: Anonymous all set for June 9 Nation-wide Protests against Censorship,Anonymous claims to have taken down the website of Telecom Company MTNL yesterday via a Distributed Denial of Service (DDoS) attack.,http://www.cio.in/news/anonymous-all-set-june-9-nation-wide-protests-against-censorship-269642012,6/7/2012,Denial of Service,Unknown,Downtime,Telekom,India,Yes,Distributed Denial of Service Attack,1,Unknown,Unknown,Unknown,None,NA,
-2012-259,WHID 2012-259: Anonymous all set for June 9 Nation-wide Protests against Censorship,Anonymous claims to have taken down the website of Telecom Company MTNL yesterday via a Distributed Denial of Service (DDoS) attack.,http://www.cio.in/news/anonymous-all-set-june-9-nation-wide-protests-against-censorship-269642012,6/7/2012,Denial of Service,Unknown,Downtime,Telekom,India,Yes,Distributed Denial of Service Attack,1,Unknown,Unknown,Unknown,None,NA,
-2012-25,WHID 2012-25: Website of Vietnam's top Internet security firm hacked,"The website of Vietnam???s leading internet security firm, the Hanoi-based Bach Khoa Internetwork Security Company, has been attacked by hackers, Vietnam News Agency (VNA) quoted its representative as saying Monday.",http://www.thanhniennews.com/index/pages/20120206-vietnam-leading-internet-security-company-hacked.aspx,2/4/2012,Denial of Service,Insufficient Anti-automation,Downtime,Technology,"Hanoi, Vietnam",Yes,Denial of service,1,Unreported,Unreported,Unreported,No,NA,
-2012-25,WHID 2012-25: Website of Vietnam's top Internet security firm hacked,"The website of Vietnam???s leading internet security firm, the Hanoi-based Bach Khoa Internetwork Security Company, has been attacked by hackers, Vietnam News Agency (VNA) quoted its representative as saying Monday.",http://www.thanhniennews.com/index/pages/20120206-vietnam-leading-internet-security-company-hacked.aspx,2/4/2012,Denial of Service,Insufficient Anti-automation,Downtime,Technology,"Hanoi, Vietnam",Yes,Denial of service,1,Unreported,Unreported,Unreported,No,NA,
-2012-260,WHID 2012-260: Govt site taken down in censorship protest,"Hours ahead of its planned protest against certain incidents of internet censorship in India , hacker collective Anonymous attacked andbroughtdown the website run by Computer Emergency Response Team India (CERT-I n), the country's premier agency dealing with cyber security contingencies .",http://articles.timesofindia.indiatimes.com/2012-06-10/chennai/32155621_1_opindia-web-censorship-cert,6/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Internet Security,India,Yes,Distributed denial of service,1,Unknown,Unknown,Unknown,None,NA,
-2012-260,WHID 2012-260: Govt site taken down in censorship protest,"Hours ahead of its planned protest against certain incidents of internet censorship in India , hacker collective Anonymous attacked andbroughtdown the website run by Computer Emergency Response Team India (CERT-I n), the country's premier agency dealing with cyber security contingencies .",http://articles.timesofindia.indiatimes.com/2012-06-10/chennai/32155621_1_opindia-web-censorship-cert,6/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Internet Security,India,Yes,Distributed denial of service,1,Unknown,Unknown,Unknown,None,NA,
-2012-261,WHID 2012-261: Russian sites go offline as protests begin,The websites of Russia's main independent news sources became inaccessible on Tuesday as protesters gathered in Moscow for a march against President Vladimir Putin's third Kremlin term.,http://www.abs-cbnnews.com/global-filipino/world/06/12/12/russian-sites-go-offline-protests-begin,6/12/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,Russia,Yes,Denial of service,4+,Unknown,Unknown,Unknown,None,N/A,
-2012-261,WHID 2012-261: Russian sites go offline as protests begin,The websites of Russia's main independent news sources became inaccessible on Tuesday as protesters gathered in Moscow for a march against President Vladimir Putin's third Kremlin term.,http://www.abs-cbnnews.com/global-filipino/world/06/12/12/russian-sites-go-offline-protests-begin,6/12/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,Russia,Yes,Denial of service,4+,Unknown,Unknown,Unknown,None,N/A,
-2012-262,WHID 2012-262: Vice President Binay???s website hacked,The website of the Office of the Vice President (OVP) was hacked,http://technology.inquirer.net/12081/vice-president-binays-website-hacked,6/12/2012,Unknown,Unknown,Defacement,Government,Philippines,No,N/A,1,Unknown,Unknown,Unknown,None,N/A,
-2012-262,WHID 2012-262: Vice President Binay???s website hacked,The website of the Office of the Vice President (OVP) was hacked,http://technology.inquirer.net/12081/vice-president-binays-website-hacked,6/12/2012,Unknown,Unknown,Defacement,Government,Philippines,No,N/A,1,Unknown,Unknown,Unknown,None,N/A,
-2012-263,WHID 2012-263: Wawa's Website Hacked,"Hackers caused problems for Wawa's website, www.wawa.com",http://www.cspnet.com/news/technology/articles/update-wawas-website-hacked,6/8/2012,SQL Injection,Unknown,Defacement,Gas sales,Pennsylvania,No,N/A,1,Unknown,Microsoft IIS 6.0,Unknown,None,N/A,
-2012-263,WHID 2012-263: Wawa's Website Hacked,"Hackers caused problems for Wawa's website, www.wawa.com",http://www.cspnet.com/news/technology/articles/update-wawas-website-hacked,6/8/2012,SQL Injection,Unknown,Defacement,Gas sales,Pennsylvania,No,N/A,1,Unknown,Microsoft IIS 6.0,Unknown,None,N/A,
-2012-264,WHID 2012-264: Langley City website hacked,The City of Langley website was hacked by a group calling themselves the LatinHackTeam against corruption of the governments.,http://www.langleytimes.com/news/158504945.html,6/6/2012,Unknown,Unknown,Defacement,State government,Virginia,No,N/A,1,Unknown,Microsoft IIS,Unknown,None,N/A,
-2012-264,WHID 2012-264: Langley City website hacked,The City of Langley website was hacked by a group calling themselves the LatinHackTeam against corruption of the governments.,http://www.langleytimes.com/news/158504945.html,6/6/2012,Unknown,Unknown,Defacement,State government,Virginia,No,N/A,1,Unknown,Microsoft IIS,Unknown,None,N/A,
-2012-265,"WHID 2012-265: Doug Ford's website hacked by ""Dbuzz""","Anyone who visited Doug Ford's (Ward 2, Etobicoke North) website since at least yesterday afternoon didn't get the councillor's usual web presence.",http://www.openfile.ca/toronto/blog/2012/doug-fords-website-hacked-dbuzz,6/12/2012,Unknown,Unknown,Defacement,Canadian government,Toronto,No,N/A,1,Unknown,Unknown,Unknown,None,N/A,
-2012-265,"WHID 2012-265: Doug Ford's website hacked by ""Dbuzz""","Anyone who visited Doug Ford's (Ward 2, Etobicoke North) website since at least yesterday afternoon didn't get the councillor's usual web presence.",http://www.openfile.ca/toronto/blog/2012/doug-fords-website-hacked-dbuzz,6/12/2012,Unknown,Unknown,Defacement,Canadian government,Toronto,No,N/A,1,Unknown,Unknown,Unknown,None,N/A,
-2012-266,WHID 2012-266: Lebanese government Web sites hacked,Two Lebanese government Web sites were hacked Saturday by a group associated with Anonymous.,http://www.upi.com/Top_News/World-News/2012/06/16/Lebanese-government-Web-sites-hacked/UPI-61361339857705/?spt=hs&or=tn,6/16/2012,Unknown,Unknown,Defacement,Government,"Lebanon, Beirut",No,N/A,2,Unknown,Unknown,Unknown,None,N/A,
-2012-266,WHID 2012-266: Lebanese government Web sites hacked,Two Lebanese government Web sites were hacked Saturday by a group associated with Anonymous.,http://www.upi.com/Top_News/World-News/2012/06/16/Lebanese-government-Web-sites-hacked/UPI-61361339857705/?spt=hs&or=tn,6/16/2012,Unknown,Unknown,Defacement,Government,"Lebanon, Beirut",No,N/A,2,Unknown,Unknown,Unknown,None,N/A,
-2012-267,WHID 2012-267: One more Gujarat government website hacked,If any one visits the official Gujarat Government website for Narmada and water supply department one would find it to be forbidden.,http://articles.timesofindia.indiatimes.com/2012-06-22/ahmedabad/32368378_1_website-water-supply-state-government,6/22/2012,Unknown,Unknown,Downtime,Government,India,No,N/A,1,Unknown,Unknown,Unknown,None,N/A,
-2012-267,WHID 2012-267: One more Gujarat government website hacked,If any one visits the official Gujarat Government website for Narmada and water supply department one would find it to be forbidden.,http://articles.timesofindia.indiatimes.com/2012-06-22/ahmedabad/32368378_1_website-water-supply-state-government,6/22/2012,Unknown,Unknown,Downtime,Government,India,No,N/A,1,Unknown,Unknown,Unknown,None,N/A,
-2012-268,"WHID 2012-268: Hackers hit US Navy, Homeland Security sites","Hackers claimed to break into the subdomains of two major United States government agencies, posting what appeared to be stolen data online.",http://www.gmanetwork.com/news/story/262936/scitech/technology/hackers-hit-us-navy-homeland-security-sites,6/23/2012,SQL Injection,Unknown,Leakage of Information,Government,United States,No,N/A,2,Unknown,Unknown,Unknown,"usernames, passwords, email IDs, and security questions and answers.",Unknown,
-2012-268,"WHID 2012-268: Hackers hit US Navy, Homeland Security sites","Hackers claimed to break into the subdomains of two major United States government agencies, posting what appeared to be stolen data online.",http://www.gmanetwork.com/news/story/262936/scitech/technology/hackers-hit-us-navy-homeland-security-sites,6/23/2012,SQL Injection,Unknown,Leakage of Information,Government,United States,No,N/A,2,Unknown,Unknown,Unknown,"usernames, passwords, email IDs, and security questions and answers.",Unknown,
-2012-269,"WHID 2012-269: Colombian hackers attack govt, political website to protest justice reform",Hackers shut down the websites of Colombia's Justice Ministry and a coalition party to protest a widely criticized judicial reform.,http://colombiareports.com/colombia-news/news/24736-colombian-hackers-attack-govt-political-website-to-protest-justice-reform.html,6/22/2012,Denial of Service,Unknown,Downtime,Government,"Columbia, South America",Yes,Denial of service,2,Columbia,Unknown,Unknown,None,N/A,
-2012-269,"WHID 2012-269: Colombian hackers attack govt, political website to protest justice reform",Hackers shut down the websites of Colombia's Justice Ministry and a coalition party to protest a widely criticized judicial reform.,http://colombiareports.com/colombia-news/news/24736-colombian-hackers-attack-govt-political-website-to-protest-justice-reform.html,6/22/2012,Denial of Service,Unknown,Downtime,Government,"Columbia, South America",Yes,Denial of service,2,Columbia,Unknown,Unknown,None,N/A,
-2012-26,WHID 2012-26: Russia???s Largest BitTorrent Tracker Under Huge DDoS Attack,"RUTracker, Russia???s largest BitTorrent tracker, has been dealing with the effects of a DDoS attack over the past 48 hours.",http://torrentfreak.com/russias-largest-bittorrent-tracker-under-huge-ddos-attack-120208/,2/6/2012,Denial of Service,Insufficient Anti-automation,Downtime,Information,Russia,Yes,Denial of service,1,Unreported,Unreported,Unreported,None,NA,
-2012-26,WHID 2012-26: Russia???s Largest BitTorrent Tracker Under Huge DDoS Attack,"RUTracker, Russia???s largest BitTorrent tracker, has been dealing with the effects of a DDoS attack over the past 48 hours.",http://torrentfreak.com/russias-largest-bittorrent-tracker-under-huge-ddos-attack-120208/,2/6/2012,Denial of Service,Insufficient Anti-automation,Downtime,Information,Russia,Yes,Denial of service,1,Unreported,Unreported,Unreported,None,NA,
-2012-270,WHID 2012-270: Maldives websites report denial-of-service (DDoS) cyberattacks,Telecommunications firm Dhiraagu has confirmed that websites in the Maldives have been targeted in apparent Denial of Service (DDoS) cyberattacks.,http://minivannews.com/society/maldives-websites-report-denial-of-service-ddos-cyberattacks-40282,7/4/2012,Denial of Service,Insufficient Anti-automation,Downtime,Telecommunications,Maldives,Yes,Denial of Service,Multiple,Unknown,Unknown,Unknown,No,N/A,
-2012-270,WHID 2012-270: Maldives websites report denial-of-service (DDoS) cyberattacks,Telecommunications firm Dhiraagu has confirmed that websites in the Maldives have been targeted in apparent Denial of Service (DDoS) cyberattacks.,http://minivannews.com/society/maldives-websites-report-denial-of-service-ddos-cyberattacks-40282,7/4/2012,Denial of Service,Insufficient Anti-automation,Downtime,Telecommunications,Maldives,Yes,Denial of Service,Multiple,Unknown,Unknown,Unknown,No,N/A,
-2012-271,WHID 2012-271: Majid Michel???s website hacked,"According to ZebraChild / Erawoc Brothers Group, handlers of actor Majid Michel???s official website, the website has been hacked on a grand scale, forcing them to put it offline for a while.",http://www.ghanaweb.com/GhanaHomePage/NewsArchive/artikel.php?ID=243952,7/6/2012,Malware Injection,Unknown,Downtime,Entertainment,Ghana,No,N/A,1,Unknown,Unknown,Unknown,No,N/A,
-2012-271,WHID 2012-271: Majid Michel???s website hacked,"According to ZebraChild / Erawoc Brothers Group, handlers of actor Majid Michel???s official website, the website has been hacked on a grand scale, forcing them to put it offline for a while.",http://www.ghanaweb.com/GhanaHomePage/NewsArchive/artikel.php?ID=243952,7/6/2012,Malware Injection,Unknown,Downtime,Entertainment,Ghana,No,N/A,1,Unknown,Unknown,Unknown,No,N/A,
-2012-272,WHID 2012-272: Indian hacker defaces National Highway Authority website,The website of the National Highway Authority was defaced by an Indian hacker going by the alias Ashell.,http://tribune.com.pk/story/404965/indian-hacker-defaces-national-highway-authority-website/,7/7/2012,Unknown,Unknown,Defacement,Government,Pakistan,No,N/A,1,Unknown,Apache 2.22,Unknown,None,N/A,
-2012-272,WHID 2012-272: Indian hacker defaces National Highway Authority website,The website of the National Highway Authority was defaced by an Indian hacker going by the alias Ashell.,http://tribune.com.pk/story/404965/indian-hacker-defaces-national-highway-authority-website/,7/7/2012,Unknown,Unknown,Defacement,Government,Pakistan,No,N/A,1,Unknown,Apache 2.22,Unknown,None,N/A,
-2012-273,WHID 2012-273: Tamil Nadu's police website hacked,The Cyber Crime Cell of Tamil Nadu Police has been directed to probe the hacking of the state police's website allegedly by a hacktivist group named 'Anonymous.',http://articles.timesofindia.indiatimes.com/2012-07-11/security/32631877_1_police-website-hacktivist-group-security-audit,7/11/2012,Unknown,Unknown,Leakage of Information,Law Enforcment,India,No,N/A,1,Unknown,Unknown,None,Grievance data,Unknown,
-2012-273,WHID 2012-273: Tamil Nadu's police website hacked,The Cyber Crime Cell of Tamil Nadu Police has been directed to probe the hacking of the state police's website allegedly by a hacktivist group named 'Anonymous.',http://articles.timesofindia.indiatimes.com/2012-07-11/security/32631877_1_police-website-hacktivist-group-security-audit,7/11/2012,Unknown,Unknown,Leakage of Information,Law Enforcment,India,No,N/A,1,Unknown,Unknown,None,Grievance data,Unknown,
-2012-274,"WHID 2012-274: Social site Formspring hacked, passwords disabled",Social networking site Formspring said that it was disabling nearly 30 million registered users??? passwords after hundreds of thousands of them were leaked to the Web in their encrypted form.,http://www.boston.com/business/technology/2012/07/11/formspring-site-hacked-passwords-leaked-web/qsm1Ytov74SW6zyuQnG18J/story.html,7/9/2012,Unknown,Unknown,Leakage of Information,Social Networking,San Francisco,No,N/A,1,Unknown,PHP,Unknown,Passwords,420000,
-2012-274,"WHID 2012-274: Social site Formspring hacked, passwords disabled",Social networking site Formspring said that it was disabling nearly 30 million registered users??? passwords after hundreds of thousands of them were leaked to the Web in their encrypted form.,http://www.boston.com/business/technology/2012/07/11/formspring-site-hacked-passwords-leaked-web/qsm1Ytov74SW6zyuQnG18J/story.html,7/9/2012,Unknown,Unknown,Leakage of Information,Social Networking,San Francisco,No,N/A,1,Unknown,PHP,Unknown,Passwords,420000,
-2012-275,"WHID 2012-275: Yahoo Voice Website Reportedly Hacked, Over 453,000 User Accounts And Passwords Allegedly Exposed","Yahoo has reportedly fallen prey to a latest cyber attack, in which hackers of a hacking group named D33Ds Company claimed to have breached a Yahoo Voice server and posted over 453,000 user accounts and passwords, retrieved in plaintext.",http://www.ibtimes.com/yahoo-voice-website-reportedly-hacked-over-453000-user-accounts-and-passwords-allegedly-exposed,7/12/2012,SQL Injection,Improper Input Handling,Leakage of Information,Telecommunications,Netherlands,No,NA,1,Unknown,ASP.NET,Unknown,User passwords,"453,492 passwords",
-2012-275,"WHID 2012-275: Yahoo Voice Website Reportedly Hacked, Over 453,000 User Accounts And Passwords Allegedly Exposed","Yahoo has reportedly fallen prey to a latest cyber attack, in which hackers of a hacking group named D33Ds Company claimed to have breached a Yahoo Voice server and posted over 453,000 user accounts and passwords, retrieved in plaintext.",http://www.ibtimes.com/yahoo-voice-website-reportedly-hacked-over-453000-user-accounts-and-passwords-allegedly-exposed,7/12/2012,SQL Injection,Improper Input Handling,Leakage of Information,Telecommunications,Netherlands,No,NA,1,Unknown,ASP.NET,Unknown,User passwords,"453,492 passwords",
-2012-276,WHID 2012-276: Android Forums website hacked,"Android fansite Phandroid has admitted that its website was hacked this week and details of more than 1,034,235 were exposed.",http://news.techeye.net/security/android-forums-website-hacked,7/13/2012,SQL Injection,Improper Input Handling,Leakage of Information,Forums,"Ellicott City, MD",No,NA,1,Unknown,Unknown,Unknown,"usernames, e-mail addresses, hashed passwords, registration IP addresses",1034235,
-2012-276,WHID 2012-276: Android Forums website hacked,"Android fansite Phandroid has admitted that its website was hacked this week and details of more than 1,034,235 were exposed.",http://news.techeye.net/security/android-forums-website-hacked,7/13/2012,SQL Injection,Improper Input Handling,Leakage of Information,Forums,"Ellicott City, MD",No,NA,1,Unknown,Unknown,Unknown,"usernames, e-mail addresses, hashed passwords, registration IP addresses",1034235,
-2012-277,"WHID 2012-277: Colombian hackers attack govt, political website to protest justice reform",Hackers shut down the websites of Colombia's Justice Ministry and a coalition party Friday to protest a widely criticized judicial reform. Hacker collective Anonymous announced the shut-down of the Justice Ministry website on Friday evening. The website was back online Saturday morning.,http://colombiareports.com/colombia-news/news/24736-colombian-hackers-attack-govt-political-website-to-protest-justice-reform.html,6/23/2012,Unknown,Unknown,Defacement,Government,Columbia,,Anonymous,,,,,,,
-2012-277,"WHID 2012-277: Colombian hackers attack govt, political website to protest justice reform",Hackers shut down the websites of Colombia's Justice Ministry and a coalition party Friday to protest a widely criticized judicial reform. Hacker collective Anonymous announced the shut-down of the Justice Ministry website on Friday evening. The website was back online Saturday morning.,http://colombiareports.com/colombia-news/news/24736-colombian-hackers-attack-govt-political-website-to-protest-justice-reform.html,6/23/2012,Unknown,Unknown,Defacement,Government,Columbia,,Anonymous,,,,,,,
-2012-278,WHID 2012-278: Gang hacks IRCTC website and books Tatkal tickets,"But it has now emerged that a gang has been operating for a couple of years, hacking into the IRCTC website and buying Tatkal tickets even before you could log into the system. The gang, which was operating out of Uttar Pradesh, was making quite a killing, selling these Tatkal tickets at a commission ranging from Rs.500 to Rs.1,000. Read more at: http://indiatoday.intoday.in/story/gang-hacks-irctc-website-and-books-tatkal-tickets/1/202152.html",http://indiatoday.intoday.in/story/gang-hacks-irctc-website-and-books-tatkal-tickets/1/202152.html,6/24/2012,Predictable Resource Location,Insufficient Process Validation,Monetary Loss,Transportation,India,,,,,,,,,
-2012-278,WHID 2012-278: Gang hacks IRCTC website and books Tatkal tickets,"But it has now emerged that a gang has been operating for a couple of years, hacking into the IRCTC website and buying Tatkal tickets even before you could log into the system. The gang, which was operating out of Uttar Pradesh, was making quite a killing, selling these Tatkal tickets at a commission ranging from Rs.500 to Rs.1,000. Read more at: http://indiatoday.intoday.in/story/gang-hacks-irctc-website-and-books-tatkal-tickets/1/202152.html",http://indiatoday.intoday.in/story/gang-hacks-irctc-website-and-books-tatkal-tickets/1/202152.html,6/24/2012,Predictable Resource Location,Insufficient Process Validation,Monetary Loss,Transportation,India,,,,,,,,,
-2012-279,WHID 2012-279: 'Anonymous' hackers attack govt websites,The international hackers group Anonymous has launched a series of cyber-attacks against Japanese government websites in an operation apparently triggered by the group's displeasure with the recent introduction of stiffer punishments for illegal downloads.,http://www.yomiuri.co.jp/dy/national/T120627005770.htm,6/28/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Japan,,,,,,,,,
-2012-279,WHID 2012-279: 'Anonymous' hackers attack govt websites,The international hackers group Anonymous has launched a series of cyber-attacks against Japanese government websites in an operation apparently triggered by the group's displeasure with the recent introduction of stiffer punishments for illegal downloads.,http://www.yomiuri.co.jp/dy/national/T120627005770.htm,6/28/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Japan,,,,,,,,,
-2012-27,WHID 2012-27: Teampoison hacktivists deface Daily Mail recipe page,"The Daily Mail, one of the UK???s leading newspapers, and generally considered to be politically right of center, has had its website defaced by the Teampoison hacking group.",http://www.infosecurity-magazine.com/view/23720/teampoison-hacktivists-deface-daily-mail-recipe-page/,2/5/2012,Unknown,Unknown,Defacement,Media,United Kingdom,No,NA,1,Unreported,Unreported,Unreported,None,NA,
-2012-27,WHID 2012-27: Teampoison hacktivists deface Daily Mail recipe page,"The Daily Mail, one of the UK???s leading newspapers, and generally considered to be politically right of center, has had its website defaced by the Teampoison hacking group.",http://www.infosecurity-magazine.com/view/23720/teampoison-hacktivists-deface-daily-mail-recipe-page/,2/5/2012,Unknown,Unknown,Defacement,Media,United Kingdom,No,NA,1,Unreported,Unreported,Unreported,None,NA,
-2012-280,WHID 2012-280: Russian opposition leader's Twitter and email accounts hacked,"HACKERS have broken into a prominent Russian opposition leader's Twitter and email accounts, sending his followers abusive messages.",http://www.theaustralian.com.au/australian-it/russian-opposition-leaders-twitter-and-email-accounts-hacked/story-e6frgakx-1226409706806,6/27/2012,Unknown,Unknown,Disinformation,Social,,,,,,,,,,
-2012-280,WHID 2012-280: Russian opposition leader's Twitter and email accounts hacked,"HACKERS have broken into a prominent Russian opposition leader's Twitter and email accounts, sending his followers abusive messages.",http://www.theaustralian.com.au/australian-it/russian-opposition-leaders-twitter-and-email-accounts-hacked/story-e6frgakx-1226409706806,6/27/2012,Unknown,Unknown,Disinformation,Social,,,,,,,,,,
-2012-281,WHID 2012-281: European aeronautical parts supplier website hacked,The Web site of a European aeronautical parts supplier had been hacked and a malicious attack ??? which exploits zero-day Microsoft security vulnerability ??? was planted,http://www.thehindubusinessline.com/industry-and-economy/logistics/article3576021.ece?ref=wl_industry-and-economy,6/27/2012,Unknown,Unknown,Planting of Malware,Technology,"Bangalore, India",,,,,,,,,
-2012-281,WHID 2012-281: European aeronautical parts supplier website hacked,The Web site of a European aeronautical parts supplier had been hacked and a malicious attack ??? which exploits zero-day Microsoft security vulnerability ??? was planted,http://www.thehindubusinessline.com/industry-and-economy/logistics/article3576021.ece?ref=wl_industry-and-economy,6/27/2012,Unknown,Unknown,Planting of Malware,Technology,"Bangalore, India",,,,,,,,,
-2012-282,WHID 2012-282: The Daily News website suffers hacking,"One of Zimbabwe???s 3 most read daily newspapers, the Daily News, had its website hacked yesterday. An email tip we got, and a tweet early Sunday morning say the site was showing the page below instead of the usual content.",http://www.techzim.co.zw/2012/07/the-daily-news-website-suffers-hacking/,7/2/2012,Unknown,Unknown,Defacement,Media,Zimbabwe,,,,,,,,,
-2012-282,WHID 2012-282: The Daily News website suffers hacking,"One of Zimbabwe???s 3 most read daily newspapers, the Daily News, had its website hacked yesterday. An email tip we got, and a tweet early Sunday morning say the site was showing the page below instead of the usual content.",http://www.techzim.co.zw/2012/07/the-daily-news-website-suffers-hacking/,7/2/2012,Unknown,Unknown,Defacement,Media,Zimbabwe,,,,,,,,,
-2012-283,WHID 2012-283: Hackers take down Turkish Foreign Ministry website,"Socialist group RedHack brought down the Turkish Foreign Ministry website on July 3 morning, replacing its contents with pictures showing the Turkish prime minister embracing former Libyan dictator Muammar Gaddafi and Syrian President Bashar al-Assad.",http://www.panarmenian.net/eng/news/114518/Hackers_take_down_Turkish_Foreign_Ministry_website,7/3/2012,Unknown,Unknown,Defacement,Government,Turkey,,,,,,,,,
-2012-283,WHID 2012-283: Hackers take down Turkish Foreign Ministry website,"Socialist group RedHack brought down the Turkish Foreign Ministry website on July 3 morning, replacing its contents with pictures showing the Turkish prime minister embracing former Libyan dictator Muammar Gaddafi and Syrian President Bashar al-Assad.",http://www.panarmenian.net/eng/news/114518/Hackers_take_down_Turkish_Foreign_Ministry_website,7/3/2012,Unknown,Unknown,Defacement,Government,Turkey,,,,,,,,,
-2012-284,WHID 2012-284: Hackers skew poll on alcohol reform,He said voting on the poll jumped from about 100 votes to 4000 in the space of about 24 hours. He said the source of the votes couldn't be traced but said technicians suggested the source was either a robot or a programme which had been written to continuously vote on one option.,http://www.rotoruadailypost.co.nz/news/hackers-skew-poll-on-alcohol-reform/1439503/,7/3/2012,Automation,Insufficient Anti-automation,Disinformation,Government,,,,,,,,,,
-2012-284,WHID 2012-284: Hackers skew poll on alcohol reform,He said voting on the poll jumped from about 100 votes to 4000 in the space of about 24 hours. He said the source of the votes couldn't be traced but said technicians suggested the source was either a robot or a programme which had been written to continuously vote on one option.,http://www.rotoruadailypost.co.nz/news/hackers-skew-poll-on-alcohol-reform/1439503/,7/3/2012,Automation,Insufficient Anti-automation,Disinformation,Government,,,,,,,,,,
-2012-285,WHID 2012-285: Al Jazeera's 'The Stream' Twitter Account Hacked By Assad Supporters,The Twitter account of Al-Jazeera's English-language social media show has been hacked by supporters of Syrian President Bashar Assad.,http://www.huffingtonpost.com/2012/07/05/al-jazeera-stream-twitter-hacked-assad_n_1651410.html,7/5/2012,Unknown,Unknown,Disinformation,Social,,,,,,,,,,
-2012-285,WHID 2012-285: Al Jazeera's 'The Stream' Twitter Account Hacked By Assad Supporters,The Twitter account of Al-Jazeera's English-language social media show has been hacked by supporters of Syrian President Bashar Assad.,http://www.huffingtonpost.com/2012/07/05/al-jazeera-stream-twitter-hacked-assad_n_1651410.html,7/5/2012,Unknown,Unknown,Disinformation,Social,,,,,,,,,,
-2012-286,WHID 2012-286: Jets??? Darrelle Revis: Trade Tweet Came From Hacker,"A message was posted to Darrelle Revis??? Twitter page just after 6:30 p.m. on Wednesday, in which the star cornerback appeared to curse out agents Neil Schwartz and Jonathan Feinsod ??? along with business manager John Geiger ??? for ???getting me traded.???",http://newyork.cbslocal.com/2012/07/05/jets-darrelle-revis-trade-tweet-came-from-hacker/,7/5/2012,Unknown,Unknown,Disinformation,Social,,,,,,,,,,
-2012-286,WHID 2012-286: Jets??? Darrelle Revis: Trade Tweet Came From Hacker,"A message was posted to Darrelle Revis??? Twitter page just after 6:30 p.m. on Wednesday, in which the star cornerback appeared to curse out agents Neil Schwartz and Jonathan Feinsod ??? along with business manager John Geiger ??? for ???getting me traded.???",http://newyork.cbslocal.com/2012/07/05/jets-darrelle-revis-trade-tweet-came-from-hacker/,7/5/2012,Unknown,Unknown,Disinformation,Social,,,,,,,,,,
-2012-287,WHID 2012-287: NetGear routers rooted by SQLi,A BlackHat presenter has extracted passwords from temporary databases in consumer routers including Netgear using SQL Injection attacks.,"http://www.scmagazine.com.au/News/307818,netgear-routers-rooted-by-sqli.aspx",7/6/2012,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,,,,,,,,,
-2012-287,WHID 2012-287: NetGear routers rooted by SQLi,A BlackHat presenter has extracted passwords from temporary databases in consumer routers including Netgear using SQL Injection attacks.,"http://www.scmagazine.com.au/News/307818,netgear-routers-rooted-by-sqli.aspx",7/6/2012,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,,,,,,,,,
-2012-288,WHID 2012-288: Best Buy says some customer accounts hacked,"Best Buy says some customers' email accounts may have been hacked. The retail giant is notifying those customers via email, telling them their current passwords have been disabled and asking them to reset their passwords.",http://www.nbcnews.com/technology/technolog/best-buy-says-some-customer-accounts-hacked-867048,7/7/2012,Brute Force,Insufficient Authentication,Account Takeover,Retail,,,,,,,,,,
-2012-288,WHID 2012-288: Best Buy says some customer accounts hacked,"Best Buy says some customers' email accounts may have been hacked. The retail giant is notifying those customers via email, telling them their current passwords have been disabled and asking them to reset their passwords.",http://www.nbcnews.com/technology/technolog/best-buy-says-some-customer-accounts-hacked-867048,7/7/2012,Brute Force,Insufficient Authentication,Account Takeover,Retail,,,,,,,,,,
-2012-289,WHID 2012-289: State server hacked in ???war??? on graft,It has come to light that a group called ???OpIndia??? had hacked government servers and posted large files of complaints received online by the Tamil Nadu police and its responses on Anonymous India???s Facebook page.,http://www.asianage.com/chennai/state-server-hacked-war-graft-644,7/10/2012,Unknown,Unknown,Leakage of Information,Government,,,,,,,,,,
-2012-289,WHID 2012-289: State server hacked in ???war??? on graft,It has come to light that a group called ???OpIndia??? had hacked government servers and posted large files of complaints received online by the Tamil Nadu police and its responses on Anonymous India???s Facebook page.,http://www.asianage.com/chennai/state-server-hacked-war-graft-644,7/10/2012,Unknown,Unknown,Leakage of Information,Government,,,,,,,,,,
-2012-28,WHID 2012-28: Microsoft India's retail website hacked,"Chinese hackers on Monday attacked Microsoft India's retail website and stole the usernames and passwords of its customers, forcing the company to shut it down temporarily.",http://www.hindustantimes.com/technology/BusinessComputing-Updates/Microsoft-India-s-retail-website-hacked/SP-Article1-810639.aspx,2/13/2012,Unknown,Unknown,Leakage of Information,Technology,India,Unreported,NA,1,China,Microsoft IIS,Unreported,User names and passwords,Unreported,
-2012-28,WHID 2012-28: Microsoft India's retail website hacked,"Chinese hackers on Monday attacked Microsoft India's retail website and stole the usernames and passwords of its customers, forcing the company to shut it down temporarily.",http://www.hindustantimes.com/technology/BusinessComputing-Updates/Microsoft-India-s-retail-website-hacked/SP-Article1-810639.aspx,2/13/2012,Unknown,Unknown,Leakage of Information,Technology,India,Unreported,NA,1,China,Microsoft IIS,Unreported,User names and passwords,Unreported,
-2012-290,"WHID 2012-290: Social site Formspring hacked, passwords disabled",Social networking site Formspring said Tuesday that it was disabling nearly 30 million registered users??? passwords after hundreds of thousands of them were leaked to the Web in their encrypted form.,http://www.boston.com/business/technology/2012/07/11/formspring-site-hacked-passwords-leaked-web/qsm1Ytov74SW6zyuQnG18J/story.html,7/11/2012,Unknown,Unknown,Leakage of Information,Social,,,,,,,,,,
-2012-290,"WHID 2012-290: Social site Formspring hacked, passwords disabled",Social networking site Formspring said Tuesday that it was disabling nearly 30 million registered users??? passwords after hundreds of thousands of them were leaked to the Web in their encrypted form.,http://www.boston.com/business/technology/2012/07/11/formspring-site-hacked-passwords-leaked-web/qsm1Ytov74SW6zyuQnG18J/story.html,7/11/2012,Unknown,Unknown,Leakage of Information,Social,,,,,,,,,,
-2012-291,"WHID 2012-291: 50,000 sites compromised in sustained attack","Some 50,000 websites have been compromised as part of a sustained iframe injection attack campaign targeting vulnerable plug-ins for web servers and content management systems.","http://www.scmagazine.com.au/News/308164,50000-sites-compromised-in-sustained-attack.aspx",7/10/2012,SQL Injection,Improper Input Handling,Planting of Malware,Blogs,,,,,,,,,,
-2012-291,"WHID 2012-291: 50,000 sites compromised in sustained attack","Some 50,000 websites have been compromised as part of a sustained iframe injection attack campaign targeting vulnerable plug-ins for web servers and content management systems.","http://www.scmagazine.com.au/News/308164,50000-sites-compromised-in-sustained-attack.aspx",7/10/2012,SQL Injection,Improper Input Handling,Planting of Malware,Blogs,,,,,,,,,,
-2012-292,WHID 2012-292: Microsoft patches Windows Live identity theft flaw,Microsoft recently fixed an XSS flaw in its Windows Live service that allowed an attacker to steal victims' online identities. The vulnerability was disclosed by two security researchers from Morocco.,http://www.zdnet.com/microsoft-patches-windows-live-identity-theft-flaw-7000000832/,7/12/2012,Cross-site Scripting (XSS),Improper Output Handling,Session Hijacking,Technology,,,,,,,,,,
-2012-292,WHID 2012-292: Microsoft patches Windows Live identity theft flaw,Microsoft recently fixed an XSS flaw in its Windows Live service that allowed an attacker to steal victims' online identities. The vulnerability was disclosed by two security researchers from Morocco.,http://www.zdnet.com/microsoft-patches-windows-live-identity-theft-flaw-7000000832/,7/12/2012,Cross-site Scripting (XSS),Improper Output Handling,Session Hijacking,Technology,,,,,,,,,,
-2012-293,WHID 2012-293: Nvidia and Android forums fall victim to hackers,Add two more websites to the already long list of sites that have been hacked as of late. Nvidia???s developer forum and Phandroid???s AndroidForums.com have both been breached and it is believed that usernames and hashed passwords were among the data stolen during each attack,http://www.techspot.com/news/49388-nvidia-and-android-forums-fall-victim-to-hackers.html,7/13/2012,Unknown,Unknown,Leakage of Information,Forums,,,,,,,,,,
-2012-293,WHID 2012-293: Nvidia and Android forums fall victim to hackers,Add two more websites to the already long list of sites that have been hacked as of late. Nvidia???s developer forum and Phandroid???s AndroidForums.com have both been breached and it is believed that usernames and hashed passwords were among the data stolen during each attack,http://www.techspot.com/news/49388-nvidia-and-android-forums-fall-victim-to-hackers.html,7/13/2012,Unknown,Unknown,Leakage of Information,Forums,,,,,,,,,,
-2012-294,"WHID 2012-294: Billabong website hacked; reveals passwords of 21,000 users","According to a dump from their password database, Billabong stored all passwords in plain text - presumably this made it easier to tell a user what their password was if they'd forgotten it. It also made life very easy for any hackers who wished to masquerade as the users on the site.",http://www.itwire.com/business-it-news/security/55708-billabong-website-hacked-reveals-passwords-of-21000-users,7/14/2012,Unknown,Unknown,Leakage of Information,Retail,,,,,,,,,,
-2012-294,"WHID 2012-294: Billabong website hacked; reveals passwords of 21,000 users","According to a dump from their password database, Billabong stored all passwords in plain text - presumably this made it easier to tell a user what their password was if they'd forgotten it. It also made life very easy for any hackers who wished to masquerade as the users on the site.",http://www.itwire.com/business-it-news/security/55708-billabong-website-hacked-reveals-passwords-of-21000-users,7/14/2012,Unknown,Unknown,Leakage of Information,Retail,,,,,,,,,,
-2012-295,"WHID 2012-295: Nike Gets Hacked by Brad Stephenson for $80,000+ in Sports Gear",Nike Hacker Brad Stephenson went on a shopping spree for 5 months after he found a loophole in one of Nike's websites??_ until the Secret Service caught up with him. Read more: http://www.virtual-strategy.com/2012/07/17/nike-gets-hacked-brad-stephenson-80000-sports-gear#ixzz2ChXhise4 Read more at http://www.virtual-strategy.com/2012/07/17/nike-gets-hacked-brad-stephenson-80000-sports-gear#Bx1UQ6PdmTmmoSvY.99,http://www.virtual-strategy.com/2012/07/17/nike-gets-hacked-brad-stephenson-80000-sports-gear,7/17/2012,Abuse of Functionality,Insufficient Process Validation,Fraud,Retail,,,,,,,,,,
-2012-295,"WHID 2012-295: Nike Gets Hacked by Brad Stephenson for $80,000+ in Sports Gear",Nike Hacker Brad Stephenson went on a shopping spree for 5 months after he found a loophole in one of Nike's websites??_ until the Secret Service caught up with him. Read more: http://www.virtual-strategy.com/2012/07/17/nike-gets-hacked-brad-stephenson-80000-sports-gear#ixzz2ChXhise4 Read more at http://www.virtual-strategy.com/2012/07/17/nike-gets-hacked-brad-stephenson-80000-sports-gear#Bx1UQ6PdmTmmoSvY.99,http://www.virtual-strategy.com/2012/07/17/nike-gets-hacked-brad-stephenson-80000-sports-gear,7/17/2012,Abuse of Functionality,Insufficient Process Validation,Fraud,Retail,,,,,,,,,,
-2012-296,WHID 2012-296: Tango Down: Anonymous takes down Syrian hackers??? website,"As events in Syria inch ever closer to a critical mass, Anonymous has hit the pro-Syrian hackers, the Syrian Electronic Army. Anonymous just announced that they have taken down the SEA???s website with a DDoS attack.",http://www.deathandtaxesmag.com/186003/tango-down-anonymous-takes-down-syrian-hackers-website/,7/18/2012,Denial of Service,Insufficient Anti-automation,Downtime,Blog,,,,,,,,,,
-2012-296,WHID 2012-296: Tango Down: Anonymous takes down Syrian hackers??? website,"As events in Syria inch ever closer to a critical mass, Anonymous has hit the pro-Syrian hackers, the Syrian Electronic Army. Anonymous just announced that they have taken down the SEA???s website with a DDoS attack.",http://www.deathandtaxesmag.com/186003/tango-down-anonymous-takes-down-syrian-hackers-website/,7/18/2012,Denial of Service,Insufficient Anti-automation,Downtime,Blog,,,,,,,,,,
-2012-297,WHID 2012-297: Hackers Claim Wall Street Resume Leak,"Team GhostShell leaked what it said was 50,000 user accounts for an online jobs board that focuses on Wall Street. The site, ITWallStreet.com, allows users to upload their resumes for searching by recruiters.",http://www.informationweek.com/security/attacks/hackers-claim-wall-street-resume-leak/240004023,7/19/2012,Unknown,Unknown,Leakage of Information,Technology,,,,,,,,,,
-2012-297,WHID 2012-297: Hackers Claim Wall Street Resume Leak,"Team GhostShell leaked what it said was 50,000 user accounts for an online jobs board that focuses on Wall Street. The site, ITWallStreet.com, allows users to upload their resumes for searching by recruiters.",http://www.informationweek.com/security/attacks/hackers-claim-wall-street-resume-leak/240004023,7/19/2012,Unknown,Unknown,Leakage of Information,Technology,,,,,,,,,,
-2012-298,WHID 2012-298: Pennsylvania mom allegedly hacked school website to change kids' grades,A Pennsylvania woman allegedly changed her children's grades after logging into a school computer system using passwords obtained when she worked for the district. Read more: http://www.foxnews.com/us/2012/07/19/pennsylvania-mom-allegedly-hacked-school-website-to-change-kids-grades/#ixzz2ChbzMl3Z,http://www.foxnews.com/us/2012/07/19/pennsylvania-mom-allegedly-hacked-school-website-to-change-kids-grades/,7/19/2012,Stolen Credentials,Insufficient Authentication,Fraud,Education,,,,,,,,,,
-2012-298,WHID 2012-298: Pennsylvania mom allegedly hacked school website to change kids' grades,A Pennsylvania woman allegedly changed her children's grades after logging into a school computer system using passwords obtained when she worked for the district. Read more: http://www.foxnews.com/us/2012/07/19/pennsylvania-mom-allegedly-hacked-school-website-to-change-kids-grades/#ixzz2ChbzMl3Z,http://www.foxnews.com/us/2012/07/19/pennsylvania-mom-allegedly-hacked-school-website-to-change-kids-grades/,7/19/2012,Stolen Credentials,Insufficient Authentication,Fraud,Education,,,,,,,,,,
-2012-299,WHID 2012-299: Hackers breached password security to steal UEA climate change emails,"Hackers broke into climate change emails sent by scientists at the University of East Anglia (UEA) on at least three occasions, a senior investigating officer revealed today.",http://www.eveningnews24.co.uk/news/hackers_breached_password_security_to_steal_uea_climate_change_emails_1_1452449,7/19/2012,Abuse of Functionality,Insufficient Password Recovery,Account Takeover,Education,,,,,,,,,,
-2012-299,WHID 2012-299: Hackers breached password security to steal UEA climate change emails,"Hackers broke into climate change emails sent by scientists at the University of East Anglia (UEA) on at least three occasions, a senior investigating officer revealed today.",http://www.eveningnews24.co.uk/news/hackers_breached_password_security_to_steal_uea_climate_change_emails_1_1452449,7/19/2012,Abuse of Functionality,Insufficient Password Recovery,Account Takeover,Education,,,,,,,,,,
-2012-299,"WHID 2012-299: Pinterest Locks Out Hacked Accounts, Investigates Security Breach","Pinterest has been locking user accounts due to suspicious activity, after a string of disappearing or changed user data. But as the source of the security breach is still being determined, users are advised to keep their passwords unique and to make sure they don't fall victim to social engineering attacks.",http://www.cmswire.com/cms/customer-experience/pinterest-locks-out-hacked-accounts-investigates-security-breach-016607.php,7/20/2012,Unknown,Unknown,Account Takeover,Social,,,,,,,,,,
-2012-299,"WHID 2012-299: Pinterest Locks Out Hacked Accounts, Investigates Security Breach","Pinterest has been locking user accounts due to suspicious activity, after a string of disappearing or changed user data. But as the source of the security breach is still being determined, users are advised to keep their passwords unique and to make sure they don't fall victim to social engineering attacks.",http://www.cmswire.com/cms/customer-experience/pinterest-locks-out-hacked-accounts-investigates-security-breach-016607.php,7/20/2012,Unknown,Unknown,Account Takeover,Social,,,,,,,,,,
-2012-29,"WHID 2012-29: CIA Website Hacked, Struggles To Recover",An Anonymous-related Twitter channel claimed Friday that the group had successfully taken down the CIA's public-facing website.,http://www.informationweek.com/news/security/attacks/232600729,2/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Washington D.C.,Yes,Distributed Denial of Service,1,Unreported,Unreported,Unreported,Unreported,NA,
-2012-29,"WHID 2012-29: CIA Website Hacked, Struggles To Recover",An Anonymous-related Twitter channel claimed Friday that the group had successfully taken down the CIA's public-facing website.,http://www.informationweek.com/news/security/attacks/232600729,2/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Washington D.C.,Yes,Distributed Denial of Service,1,Unreported,Unreported,Unreported,Unreported,NA,
-2012-2,WHID-2012-2: Hackers disable German right-wing websites,The websites of several right-wing extremists in Germany have been attacked by hackers.,http://www.jta.org/news/article/2012/01/05/3091030/hackers-disable-german-right-wing-websites,1/1/2012,Denial of Service,Insufficient Anti-automation,Downtime,Politics,Germany,Unknown,Denial of Service,Multiple unknown,Unknown,,,,,
-2012-300,WHID 2012-300: Eight Million Email Addresses And Passwords Spilled From Gaming Site Gamigo Months After Hacker Breach,"Four months after the gaming site Gamigo warned users about a hacker intrusion that accessed some portions of its users??? credentials, more than 8 million usernames, emails and and encrypted passwords from the site have been published on the Web, according to the data breach alert service PwnedList.",http://www.forbes.com/sites/andygreenberg/2012/07/23/eight-million-passwords-spilled-from-gaming-site-gamigo-months-after-breach/,7/23/2012,Unknown,Unknown,Leakage of Information,Gaming,,,,,,,,,,
-2012-300,WHID 2012-300: Eight Million Email Addresses And Passwords Spilled From Gaming Site Gamigo Months After Hacker Breach,"Four months after the gaming site Gamigo warned users about a hacker intrusion that accessed some portions of its users??? credentials, more than 8 million usernames, emails and and encrypted passwords from the site have been published on the Web, according to the data breach alert service PwnedList.",http://www.forbes.com/sites/andygreenberg/2012/07/23/eight-million-passwords-spilled-from-gaming-site-gamigo-months-after-breach/,7/23/2012,Unknown,Unknown,Leakage of Information,Gaming,,,,,,,,,,
-2012-301,WHID 2012-301: Bokaro school website hacked,"The official website of Chinmaya Vidyalaya, a prominent school in the city, has been hacked recently.",http://articles.timesofindia.indiatimes.com/2012-07-24/ranchi/32826694_1_website-chinmaya-vidyalaya-bokaro,7/24/2012,Unknown,Unknown,Data Loss,Education,India,,,,,,,,,
-2012-301,WHID 2012-301: Bokaro school website hacked,"The official website of Chinmaya Vidyalaya, a prominent school in the city, has been hacked recently.",http://articles.timesofindia.indiatimes.com/2012-07-24/ranchi/32826694_1_website-chinmaya-vidyalaya-bokaro,7/24/2012,Unknown,Unknown,Data Loss,Education,India,,,,,,,,,
-2012-302,WHID 2012-302: FP?? website hacked by Anonymous,The hacker group Anonymous managed to hack the Freedom Party website and switched the usual content of the site with a protest against the EU Monitoring Project INDECT.,http://austrianindependent.com/news/Politics/2012-07-23/11758/FP%D6_website_hacked_by_Anonymous.,7/23/2012,Unknown,Unknown,Defacement,Politics,Austria,,,,,,,,,
-2012-302,WHID 2012-302: FP?? website hacked by Anonymous,The hacker group Anonymous managed to hack the Freedom Party website and switched the usual content of the site with a protest against the EU Monitoring Project INDECT.,http://austrianindependent.com/news/Politics/2012-07-23/11758/FP%D6_website_hacked_by_Anonymous.,7/23/2012,Unknown,Unknown,Defacement,Politics,Austria,,,,,,,,,
-2012-303,WHID 2012-303: Anonymous hackers cripple Australian gov't websites,International hacking group Anonymous took at least 10 Australian government websites offline briefly Tuesday in a series of escalating attacks over proposed changes to privacy laws. Read more: http://www.foxnews.com/tech/2012/07/24/anonymous-hackers-cripple-australian-govt-websites/#ixzz2ChlstWvb,http://www.foxnews.com/tech/2012/07/24/anonymous-hackers-cripple-australian-govt-websites/,7/24/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Australia,,,,,,,,,
-2012-303,WHID 2012-303: Anonymous hackers cripple Australian gov't websites,International hacking group Anonymous took at least 10 Australian government websites offline briefly Tuesday in a series of escalating attacks over proposed changes to privacy laws. Read more: http://www.foxnews.com/tech/2012/07/24/anonymous-hackers-cripple-australian-govt-websites/#ixzz2ChlstWvb,http://www.foxnews.com/tech/2012/07/24/anonymous-hackers-cripple-australian-govt-websites/,7/24/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Australia,,,,,,,,,
-2012-304,WHID 2012-304: Zerigo falls victim to DDoS attackers,Cloud services provider Zerigo has lost at least one client after its DNS servers suffered a ???sustained??? distributed denial of service (DDoS) attack.,http://www.cloudpro.co.uk/cloud-essentials/general/4171/zerigo-falls-victim-ddos-attackers,7/25/2012,Denial of Service,Insufficient Anti-automation,Downtime,Hosting Provider,,,,,,,,,,
-2012-304,WHID 2012-304: Zerigo falls victim to DDoS attackers,Cloud services provider Zerigo has lost at least one client after its DNS servers suffered a ???sustained??? distributed denial of service (DDoS) attack.,http://www.cloudpro.co.uk/cloud-essentials/general/4171/zerigo-falls-victim-ddos-attackers,7/25/2012,Denial of Service,Insufficient Anti-automation,Downtime,Hosting Provider,,,,,,,,,,
-2012-305,WHID 2012-305: Union website shut by Anonymous ???hacktivist???,"Last Friday, 3F???s website was shutdown after a so-called DDoS attack in which the site was flooded with traffic causing a virtual traffic jam and rendering the site inaccessible for legitimate users.",http://cphpost.dk/news/national/union-website-shut-anonymous-%E2%80%98hacktivist%E2%80%99,7/25/2012,Denial of Service,Insufficient Anti-automation,Downtime,Politics,,,,,,,,,,
-2012-305,WHID 2012-305: Union website shut by Anonymous ???hacktivist???,"Last Friday, 3F???s website was shutdown after a so-called DDoS attack in which the site was flooded with traffic causing a virtual traffic jam and rendering the site inaccessible for legitimate users.",http://cphpost.dk/news/national/union-website-shut-anonymous-%E2%80%98hacktivist%E2%80%99,7/25/2012,Denial of Service,Insufficient Anti-automation,Downtime,Politics,,,,,,,,,,
-2012-306,WHID 2012-306: AAPT hacked,"AAPT has confirmed a breach of systems held at an external service provider that saw some of the telco's ""business customer data"" compromised.","http://www.scmagazine.com.au/News/309922,confirmed-aapt-hacked.aspx",7/26/2012,Unknown,Unknown,Leakage of Information,Service Providers,,,,,,,,,,
-2012-306,WHID 2012-306: AAPT hacked,"AAPT has confirmed a breach of systems held at an external service provider that saw some of the telco's ""business customer data"" compromised.","http://www.scmagazine.com.au/News/309922,confirmed-aapt-hacked.aspx",7/26/2012,Unknown,Unknown,Leakage of Information,Service Providers,,,,,,,,,,
-2012-307,WHID 2012-307: Demonoid hit by DDoS attack,"Demonoid, one of the biggest torrent sites around, has been taken down by a massive Distributed Denial of Service (DDoS) attack. The website has been hit many times before, and this outage is another one that will take quite a while to resolve.",http://www.zdnet.com/demonoid-hit-by-ddos-attack-7000001732/,7/27/2012,Denial of Service,Insufficient Anti-automation,Downtime,Torrent Site,,,,,,,,,,
-2012-307,WHID 2012-307: Demonoid hit by DDoS attack,"Demonoid, one of the biggest torrent sites around, has been taken down by a massive Distributed Denial of Service (DDoS) attack. The website has been hit many times before, and this outage is another one that will take quite a while to resolve.",http://www.zdnet.com/demonoid-hit-by-ddos-attack-7000001732/,7/27/2012,Denial of Service,Insufficient Anti-automation,Downtime,Torrent Site,,,,,,,,,,
-2012-308,WHID 2012-308: Data of 8.7 million KT subscribers hacked in South Korea,"KT Corp., South Korea's No. 2 wireless service provider, apologized on Sunday after personal data of millions of mobile phone subscribers was hacked.",http://in.reuters.com/article/2012/07/29/us-korea-hacking-idINBRE86S01Y20120729,7/29/2012,Unknown,Unknown,Leakage of Information,Service Providers,South Korea,,,,,,,,,
-2012-308,WHID 2012-308: Data of 8.7 million KT subscribers hacked in South Korea,"KT Corp., South Korea's No. 2 wireless service provider, apologized on Sunday after personal data of millions of mobile phone subscribers was hacked.",http://in.reuters.com/article/2012/07/29/us-korea-hacking-idINBRE86S01Y20120729,7/29/2012,Unknown,Unknown,Leakage of Information,Service Providers,South Korea,,,,,,,,,
-2012-309,WHID 2012-309: NewsOne website hacked for media???s ???inadequate coverage of Burma killings???,"The website of private TV channel NewsOne was hacked in an attempt ???to open the eyes of Pakistanis as well as the media personnel??? towards the killings of Rohingya Muslims in Myanmar, reported ProPakistani on Tuesday. However, the site has been recovered now.",http://tribune.com.pk/story/415403/newsone-website-hacked-for-medias-inadequate-coverage-of-burma-killings/,7/31/2012,Unknown,Unknown,Defacement,Media,,,,,,,,,,
-2012-309,WHID 2012-309: NewsOne website hacked for media???s ???inadequate coverage of Burma killings???,"The website of private TV channel NewsOne was hacked in an attempt ???to open the eyes of Pakistanis as well as the media personnel??? towards the killings of Rohingya Muslims in Myanmar, reported ProPakistani on Tuesday. However, the site has been recovered now.",http://tribune.com.pk/story/415403/newsone-website-hacked-for-medias-inadequate-coverage-of-burma-killings/,7/31/2012,Unknown,Unknown,Defacement,Media,,,,,,,,,,
-2012-30,WHID 2012-30: Hackers Claim Attack on American Tear Gas Company,"A U.S. security company whose tear gas has been used against Egyptian demonstrators has become the latest victim of the Anonymous movement, hackers claimed Tuesday.A U.S. seA U.S. security company whose tear gas has been used against Egyptian demonstrators has become the latest victim of the Anonymous movement, hackers claimed Tuesday. curity company whose tear gas has been used against Egyptian demonstrators has become the latest victim of the Anonymous movement, hackers claimed Tuesday.",http://abcnews.go.com/International/wireStory/hackers-claim-attack-american-tear-gas-company-15579671#.TzsfFUxSS_c,2/14/2012,Unknown,Unknown,Leakage of Information,Retail,Florida,Unreported,NA,1,Unreported,Unreported,Unreported,User names and passwords,Unreported,
-2012-30,WHID 2012-30: Hackers Claim Attack on American Tear Gas Company,"A U.S. security company whose tear gas has been used against Egyptian demonstrators has become the latest victim of the Anonymous movement, hackers claimed Tuesday.A U.S. seA U.S. security company whose tear gas has been used against Egyptian demonstrators has become the latest victim of the Anonymous movement, hackers claimed Tuesday. curity company whose tear gas has been used against Egyptian demonstrators has become the latest victim of the Anonymous movement, hackers claimed Tuesday.",http://abcnews.go.com/International/wireStory/hackers-claim-attack-american-tear-gas-company-15579671#.TzsfFUxSS_c,2/14/2012,Unknown,Unknown,Leakage of Information,Retail,Florida,Unreported,NA,1,Unreported,Unreported,Unreported,User names and passwords,Unreported,
-2012-310,WHID 2012-310: Daily Caller Hacked: Banner Replaced With Porn Ad,The Daily Caller is offering a gun as a reward for finding the person who hacked the website with porn ads.,http://www.huffingtonpost.com/2012/07/30/daily-caller-hacked-porn-ads_n_1720830.html,7/30/2012,Unknown,Unknown,Defacement,Politics,,,,,,,,,,
-2012-310,WHID 2012-310: Daily Caller Hacked: Banner Replaced With Porn Ad,The Daily Caller is offering a gun as a reward for finding the person who hacked the website with porn ads.,http://www.huffingtonpost.com/2012/07/30/daily-caller-hacked-porn-ads_n_1720830.html,7/30/2012,Unknown,Unknown,Defacement,Politics,,,,,,,,,,
-2012-311,WHID 2012-311: Dropbox confirms it got hacked,"In an explanatory blog post, Dropbox today said a stolen password was ""used to access an employee Dropbox account containing a project document with user email addresses."" Hackers apparently started spamming those addresses, although there???s no indication that user passwords were revealed as well.",http://arstechnica.com/security/2012/07/dropbox-confirms-it-got-hacked-will-offer-two-factor-authentication/,7/31/2012,Stolen Credentials,Insufficient Authentication,Leakage of Information,Technology,,,,,,,,,,
-2012-311,WHID 2012-311: Dropbox confirms it got hacked,"In an explanatory blog post, Dropbox today said a stolen password was ""used to access an employee Dropbox account containing a project document with user email addresses."" Hackers apparently started spamming those addresses, although there???s no indication that user passwords were revealed as well.",http://arstechnica.com/security/2012/07/dropbox-confirms-it-got-hacked-will-offer-two-factor-authentication/,7/31/2012,Stolen Credentials,Insufficient Authentication,Leakage of Information,Technology,,,,,,,,,,
-2012-312,WHID 2012-312: Demonoid redirecting to malware after DDoS attack,"This week, though, users are reporting redirects from the Demonoid URL to an ad network, some of which are serving up a dose of malware.",http://www.cnet.com.au/demonoid-redirecting-to-malware-after-ddos-attack-339340995.htm,8/3/2012,Unknown,Unknown,Planting of Malware,Torrent Site,,,,,,,,,,
-2012-312,WHID 2012-312: Demonoid redirecting to malware after DDoS attack,"This week, though, users are reporting redirects from the Demonoid URL to an ad network, some of which are serving up a dose of malware.",http://www.cnet.com.au/demonoid-redirecting-to-malware-after-ddos-attack-339340995.htm,8/3/2012,Unknown,Unknown,Planting of Malware,Torrent Site,,,,,,,,,,
-2012-313,"WHID 2012-313: Yanks, Cubs, other MLB team Facebook pages hacked","The Facebook pages of the New York Yankees, Chicago Cubs and several other Major League Baseball clubs have been restored after briefly being hacked.",http://sports.yahoo.com/news/yanks-cubs-other-mlb-team-152805142--mlb.html,8/3/2012,Unknown,Unknown,Disinformation,Social,,,,,,,,,,
-2012-313,"WHID 2012-313: Yanks, Cubs, other MLB team Facebook pages hacked","The Facebook pages of the New York Yankees, Chicago Cubs and several other Major League Baseball clubs have been restored after briefly being hacked.",http://sports.yahoo.com/news/yanks-cubs-other-mlb-team-152805142--mlb.html,8/3/2012,Unknown,Unknown,Disinformation,Social,,,,,,,,,,
-2012-314,WHID 2012-314: Reuters News Site Hacked,"Thomson Reuters Corp. said Friday that its blogging platform for Reuters News was hacked, resulting in multiple false posts to its website, including a fake interview with a Syrian rebel army leader.",http://online.wsj.com/article/SB10000872396390443687504577567283653306226.html,8/3/2012,Unknown,Unknown,Disinformation,Media,,,,,,,,,,
-2012-314,WHID 2012-314: Reuters News Site Hacked,"Thomson Reuters Corp. said Friday that its blogging platform for Reuters News was hacked, resulting in multiple false posts to its website, including a fake interview with a Syrian rebel army leader.",http://online.wsj.com/article/SB10000872396390443687504577567283653306226.html,8/3/2012,Unknown,Unknown,Disinformation,Media,,,,,,,,,,
-2012-315,WHID 2012-315: How @Gizmodo Got Hacked and How You Should Defend Yourself,The weak link in the security chain turned out to be the seven digit alphanumeric password to our good buddy and former contributor Mat Honan's iCloud account.,http://gizmodo.com/5931828/how-gizmodo-got-hacked-and-how-you-should-defend-yourself,8/4/2012,Brute Force,Insufficient Authentication,Disinformation,Social,,,,,,,,,,
-2012-315,WHID 2012-315: How @Gizmodo Got Hacked and How You Should Defend Yourself,The weak link in the security chain turned out to be the seven digit alphanumeric password to our good buddy and former contributor Mat Honan's iCloud account.,http://gizmodo.com/5931828/how-gizmodo-got-hacked-and-how-you-should-defend-yourself,8/4/2012,Brute Force,Insufficient Authentication,Disinformation,Social,,,,,,,,,,
-2012-316,"WHID 2012-316: Reuters hacked twice in 48 hours; pro-Syrian government stories, Tweets posted","The Reuters news service suffered a second successful hacker attack this weekend, just 48 hours after a computer intruder was able to post fake news stories on its web site.",http://redtape.nbcnews.com/_news/2012/08/03/13106396-reuters-hacked-twice-in-48-hours-pro-syrian-government-stories-tweets-posted,8/3/2012,Unknown,Unknown,Disinformation,Social,,,,,,,,,,
-2012-316,"WHID 2012-316: Reuters hacked twice in 48 hours; pro-Syrian government stories, Tweets posted","The Reuters news service suffered a second successful hacker attack this weekend, just 48 hours after a computer intruder was able to post fake news stories on its web site.",http://redtape.nbcnews.com/_news/2012/08/03/13106396-reuters-hacked-twice-in-48-hours-pro-syrian-government-stories-tweets-posted,8/3/2012,Unknown,Unknown,Disinformation,Social,,,,,,,,,,
-2012-316,WHID 2012-316: VinaCapital Group website hacked,"A hacker has just brought down the website of VinaCapital Group, the parent company of one of Vietnam???s largest tech investment fund.",http://e27.sg/2012/08/07/vinacapital-group-website-hacked/,8/7/2012,Unknown,Unknown,Defacement,Finance,,,,,,,,,,
-2012-316,WHID 2012-316: VinaCapital Group website hacked,"A hacker has just brought down the website of VinaCapital Group, the parent company of one of Vietnam???s largest tech investment fund.",http://e27.sg/2012/08/07/vinacapital-group-website-hacked/,8/7/2012,Unknown,Unknown,Defacement,Finance,,,,,,,,,,
-2012-317,WHID 20120-317: FX Broker Suffers DDoS Attack,"Global eSolutions (Hong Kong) Limited, a provider of trade execution technology via personal computer and mobile devices, saw one of its clients, an online foreign exchange (FX) and contracts for difference (CFD) trading firm headquartered in the UK, become a target after management did not respond to a ransom demand from cybercriminals. Initially, Layer 3 and Layer 4 volumetric floods interrupted web site availability for approximately four hours. A second, more damaging Layer 7 attack occurred three weeks later, rendering the trading platform almost inaccessible to online traders.",http://www.waterstechnology.com/sell-side-technology/news/2197260/hong-kong-broker-suffers-ddos-attack-turns-to-prolexic,8/7/2012,Denial of Service,Insufficient Anti-automation,Monetary Loss,Finance,Hong Kong,,,,,,,,,
-2012-317,WHID 20120-317: FX Broker Suffers DDoS Attack,"Global eSolutions (Hong Kong) Limited, a provider of trade execution technology via personal computer and mobile devices, saw one of its clients, an online foreign exchange (FX) and contracts for difference (CFD) trading firm headquartered in the UK, become a target after management did not respond to a ransom demand from cybercriminals. Initially, Layer 3 and Layer 4 volumetric floods interrupted web site availability for approximately four hours. A second, more damaging Layer 7 attack occurred three weeks later, rendering the trading platform almost inaccessible to online traders.",http://www.waterstechnology.com/sell-side-technology/news/2197260/hong-kong-broker-suffers-ddos-attack-turns-to-prolexic,8/7/2012,Denial of Service,Insufficient Anti-automation,Monetary Loss,Finance,Hong Kong,,,,,,,,,
-2012-318,WHID 2012-318: UFree Network website hacked by Israeli hackers??? team,"Mohammed Hamdan, UFree network chairman, said that UFree website was hacked by Israeli hackers??? team, which totally paralyzed the website.",http://www.scoop.co.nz/stories/WO1208/S00153/ufree-network-website-hacked-by-israeli-hackers-team.htm,8/8/2012,Unknown,Unknown,Defacement,Politics,,,,,,,,,,
-2012-318,WHID 2012-318: UFree Network website hacked by Israeli hackers??? team,"Mohammed Hamdan, UFree network chairman, said that UFree website was hacked by Israeli hackers??? team, which totally paralyzed the website.",http://www.scoop.co.nz/stories/WO1208/S00153/ufree-network-website-hacked-by-israeli-hackers-team.htm,8/8/2012,Unknown,Unknown,Defacement,Politics,,,,,,,,,,
-2012-319,WHID 2012-319: Website of Burmese Information Ministry hacked,"Hackers broke into the website of the Burmese Information Ministry on Tuesday, posting a threatening message to the Burmese government which said in part, ???Stop the killing of Muslims.???",http://www.mizzima.com/news/inside-burma/7708-website-of-burmese-information-ministry-hacked.html,8/8/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-319,WHID 2012-319: Website of Burmese Information Ministry hacked,"Hackers broke into the website of the Burmese Information Ministry on Tuesday, posting a threatening message to the Burmese government which said in part, ???Stop the killing of Muslims.???",http://www.mizzima.com/news/inside-burma/7708-website-of-burmese-information-ministry-hacked.html,8/8/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-31,WHID 2012-31: Bursa website target of DDoS attack,"Stock market operator Bursa Malaysia Bhd's website was the target of a distributed denial of service attack (DDoS), whereby the site was overloaded with excess traffic from multiple sources.",http://biz.thestar.com.my/news/story.asp?file=/2012/2/14/business/20120214091735&sec=business,2/13/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,Malaysia,Yes,Distributed Denial of Service,1,Unreported,Unreported,Unreported,None,NA,
-2012-31,WHID 2012-31: Bursa website target of DDoS attack,"Stock market operator Bursa Malaysia Bhd's website was the target of a distributed denial of service attack (DDoS), whereby the site was overloaded with excess traffic from multiple sources.",http://biz.thestar.com.my/news/story.asp?file=/2012/2/14/business/20120214091735&sec=business,2/13/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,Malaysia,Yes,Distributed Denial of Service,1,Unreported,Unreported,Unreported,None,NA,
-2012-320,WHID 2012-320: Anonymous attacks Ukrainian government after Demonoid bust,"In retaliation to Demonoid's demise, Anonymous has begun its own denial of service attacks against the Ukrainian government.",http://www.zdnet.com/anonymous-attacks-ukrainian-government-after-demonoid-bust-7000002348/,8/8/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Ukrain,,,,,,,,,
-2012-320,WHID 2012-320: Anonymous attacks Ukrainian government after Demonoid bust,"In retaliation to Demonoid's demise, Anonymous has begun its own denial of service attacks against the Ukrainian government.",http://www.zdnet.com/anonymous-attacks-ukrainian-government-after-demonoid-bust-7000002348/,8/8/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Ukrain,,,,,,,,,
-2012-321,WHID 2012-321: MWSS website defaced by hackers claiming 'Anonymous' link,The website of the Metropolitan Waterworks and Sewerage System (MWSS) was defaced Thursday by hackers claiming links or solidarity with the 'Anonymous' network.,http://www.gmanetwork.com/news/story/269071/scitech/technology/mwss-website-defaced-by-hackers-claiming-anonymous-link,8/10/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-321,WHID 2012-321: MWSS website defaced by hackers claiming 'Anonymous' link,The website of the Metropolitan Waterworks and Sewerage System (MWSS) was defaced Thursday by hackers claiming links or solidarity with the 'Anonymous' network.,http://www.gmanetwork.com/news/story/269071/scitech/technology/mwss-website-defaced-by-hackers-claiming-anonymous-link,8/10/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-322,"WHID 2012-322: Nepalese Government Sites Hacked, Serving Zegost Malware","Researchers have uncovered another in an ongoing series of targeted attacks against government agencies and activists, this time an attack that compromised a pair of Nepalese government web sites with code that exploits a Java vulnerability to install a backdoor on vistors' machines.",http://threatpost.com/en_us/blogs/nepalese-government-sites-hacked-serving-zegost-malware-080812,8/8/2012,Unknown,Unknown,Planting of Malware,Government,,,,,,,,,,
-2012-322,"WHID 2012-322: Nepalese Government Sites Hacked, Serving Zegost Malware","Researchers have uncovered another in an ongoing series of targeted attacks against government agencies and activists, this time an attack that compromised a pair of Nepalese government web sites with code that exploits a Java vulnerability to install a backdoor on vistors' machines.",http://threatpost.com/en_us/blogs/nepalese-government-sites-hacked-serving-zegost-malware-080812,8/8/2012,Unknown,Unknown,Planting of Malware,Government,,,,,,,,,,
-2012-323,WHID 2012-323: Haines City government website returns after being hacked,The city of Haines City's governmental website has returned after being down after it was hacked.,http://www.baynews9.com/content/news/baynews9/news/article.html/content/news/articles/bn9/2012/8/8/haines_city_governme.html,8/8/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-323,WHID 2012-323: Haines City government website returns after being hacked,The city of Haines City's governmental website has returned after being down after it was hacked.,http://www.baynews9.com/content/news/baynews9/news/article.html/content/news/articles/bn9/2012/8/8/haines_city_governme.html,8/8/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-324,WHID 2012-324: Australian Institute of Business Brokers hacked,Hackers have broken into a website of the Australian Institute of Business Brokers and published 260 user login credentials on the internet.,"http://www.scmagazine.com.au/News/311387,australian-institute-of-business-brokers-hacked.aspx",8/9/2012,Unknown,Unknown,Leakage of Information,Finance,,,,,,,,,,
-2012-324,WHID 2012-324: Australian Institute of Business Brokers hacked,Hackers have broken into a website of the Australian Institute of Business Brokers and published 260 user login credentials on the internet.,"http://www.scmagazine.com.au/News/311387,australian-institute-of-business-brokers-hacked.aspx",8/9/2012,Unknown,Unknown,Leakage of Information,Finance,,,,,,,,,,
-2012-325,WHID 2012-325: Massive DDoS attack hits Chechen news agency,A massive distributed denial of service (DDoS) attack that peaked at 45 million packets per second (pps) has smashed into the Chechen internet news agency Kavkaz Center.,"http://www.scmagazine.com.au/News/311528,massive-ddos-attack-hits-chechen-news-agency.aspx",8/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,,,,,,,,,,
-2012-325,WHID 2012-325: Massive DDoS attack hits Chechen news agency,A massive distributed denial of service (DDoS) attack that peaked at 45 million packets per second (pps) has smashed into the Chechen internet news agency Kavkaz Center.,"http://www.scmagazine.com.au/News/311528,massive-ddos-attack-hits-chechen-news-agency.aspx",8/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,,,,,,,,,,
-2012-326,"WHID 2012-326: Hacking group Anonymous targets ASIO, DSD websites","ACTIVIST group Anonymous says it has successfully knocked offline the public website of Australia's domestic spy agency, the Australian Security Intelligence Organisation (ASIO)",http://www.heraldsun.com.au/technology/anonymous-targets-asio-website/story-fn7celvh-1226447969866,8/11/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,,,,,,,,,,
-2012-326,"WHID 2012-326: Hacking group Anonymous targets ASIO, DSD websites","ACTIVIST group Anonymous says it has successfully knocked offline the public website of Australia's domestic spy agency, the Australian Security Intelligence Organisation (ASIO)",http://www.heraldsun.com.au/technology/anonymous-targets-asio-website/story-fn7celvh-1226447969866,8/11/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,,,,,,,,,,
-2012-327,"WHID 2012-327: Blizzard's Battle.net Servers Hacked, User Info Stolen","Blizzard announced on its website last night that its security team uncovered ""unauthorized and illegal access"" to Blizzard's internal network.","http://www.pcmag.com/article2/0,2817,2408311,00.asp",8/10/2012,Unknown,Unknown,Leakage of Information,Gaming,,,,,,,,,,
-2012-327,"WHID 2012-327: Blizzard's Battle.net Servers Hacked, User Info Stolen","Blizzard announced on its website last night that its security team uncovered ""unauthorized and illegal access"" to Blizzard's internal network.","http://www.pcmag.com/article2/0,2817,2408311,00.asp",8/10/2012,Unknown,Unknown,Leakage of Information,Gaming,,,,,,,,,,
-2012-328,WHID 2012-328: Photobucket hacked: 'Fusking' software used to gain access to private images Read more: http://www.wptv.com/dpp/news/science_tech/photobucket-hacked-fusking-software-used-to-gain-access-to-private-images#ixzz2ClvGraiL,"While users who post unencrypted photos on Photobucket can make their albums password protected, individual photos, even in a private album, can be shared with others through a direct web link or URL. Read more: http://www.wptv.com/dpp/news/science_tech/photobucket-hacked-fusking-software-used-to-gain-access-to-private-images#ixzz2ClvRY6iA",http://www.wptv.com/dpp/news/science_tech/photobucket-hacked-fusking-software-used-to-gain-access-to-private-images,8/10/2012,Predictable Resource Location,Insufficient Authorization,Leakage of Information,Social,,,,,,,,,,
-2012-328,WHID 2012-328: Photobucket hacked: 'Fusking' software used to gain access to private images Read more: http://www.wptv.com/dpp/news/science_tech/photobucket-hacked-fusking-software-used-to-gain-access-to-private-images#ixzz2ClvGraiL,"While users who post unencrypted photos on Photobucket can make their albums password protected, individual photos, even in a private album, can be shared with others through a direct web link or URL. Read more: http://www.wptv.com/dpp/news/science_tech/photobucket-hacked-fusking-software-used-to-gain-access-to-private-images#ixzz2ClvRY6iA",http://www.wptv.com/dpp/news/science_tech/photobucket-hacked-fusking-software-used-to-gain-access-to-private-images,8/10/2012,Predictable Resource Location,Insufficient Authorization,Leakage of Information,Social,,,,,,,,,,
-2012-329,WHID 2012-329: Bellevue Public Schools website hacked,"The Bellevue Public Schools had to take down its website this week, just before school resumes on Tuesday. The website was infected with a virus on July 31 and information technology workers have been unable to ???cure??? it.",http://www.omaha.com/article/20120810/NEWS/708119942/1707,8/10/2012,Unknown,Unknown,Planting of Malware,Education,,,,,,,,,,
-2012-329,WHID 2012-329: Bellevue Public Schools website hacked,"The Bellevue Public Schools had to take down its website this week, just before school resumes on Tuesday. The website was infected with a virus on July 31 and information technology workers have been unable to ???cure??? it.",http://www.omaha.com/article/20120810/NEWS/708119942/1707,8/10/2012,Unknown,Unknown,Planting of Malware,Education,,,,,,,,,,
-2012-32,WHID 2012-32: Anonymous takes down Greek sites in support of Athens protests,Hacktivist group Anonymous has claimed responsibility for a series of distributed denial of service (DDoS) attacks on Greek government sites.,http://www.v3.co.uk/v3-uk/news/2152195/anonymous-takes-greek-sites-support-athens-protests,2/13/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Greece,Yes,Distributed Denial of Service,Multiple,Unreported,Unreported,Unreported,None,NA,
-2012-32,WHID 2012-32: Anonymous takes down Greek sites in support of Athens protests,Hacktivist group Anonymous has claimed responsibility for a series of distributed denial of service (DDoS) attacks on Greek government sites.,http://www.v3.co.uk/v3-uk/news/2152195/anonymous-takes-greek-sites-support-athens-protests,2/13/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Greece,Yes,Distributed Denial of Service,Multiple,Unreported,Unreported,Unreported,None,NA,
-2012-330,"WHID 2012-330: TMC Website Hacked, Declares Mamata a Maoist",Trinamool Congress' website was today hacked with the hackers posting on it a quote from party chief Mamata Banerjee that she is a Maoist.,http://news.outlookindia.com/items.aspx?artid=772006,8/14/2012,Unknown,Unknown,Defacement,Governmanet,India,,,,,,,,,
-2012-330,"WHID 2012-330: TMC Website Hacked, Declares Mamata a Maoist",Trinamool Congress' website was today hacked with the hackers posting on it a quote from party chief Mamata Banerjee that she is a Maoist.,http://news.outlookindia.com/items.aspx?artid=772006,8/14/2012,Unknown,Unknown,Defacement,Governmanet,India,,,,,,,,,
-2012-331,WHID 2012-331: Reuters Hacked With Fake Story About Saudi Arabia's Foreign Minister,The Reuters news agency says hackers have broken into one of its websites for the second time in two weeks and posted a false story saying Saudi Arabia's foreign minister had died.,http://www.huffingtonpost.com/2012/08/15/reuters-hacked-saudi-arabia-syria_n_1778525.html,8/15/2012,Unknown,Unknown,Disinformation,Media,,,,,,,,,,
-2012-331,WHID 2012-331: Reuters Hacked With Fake Story About Saudi Arabia's Foreign Minister,The Reuters news agency says hackers have broken into one of its websites for the second time in two weeks and posted a false story saying Saudi Arabia's foreign minister had died.,http://www.huffingtonpost.com/2012/08/15/reuters-hacked-saudi-arabia-syria_n_1778525.html,8/15/2012,Unknown,Unknown,Disinformation,Media,,,,,,,,,,
-2012-332,WHID 2012-332: Indian hackers break into LDA website,A group of some Indian internet hackers ??? the Indian Tigers ??? broke into the website of the Lahore Development Authority (LDA) on Tuesday and hacked it.,http://www.pakistantoday.com.pk/2012/08/15/city/lahore/indian-hackers-break-into-lda-website/,8/15/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-332,WHID 2012-332: Indian hackers break into LDA website,A group of some Indian internet hackers ??? the Indian Tigers ??? broke into the website of the Lahore Development Authority (LDA) on Tuesday and hacked it.,http://www.pakistantoday.com.pk/2012/08/15/city/lahore/indian-hackers-break-into-lda-website/,8/15/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-333,WHID 2012-333: RUTracker Hacked,The Russian BitTorrent tracker RUTracker was recently hit by hackers.,http://www.esecurityplanet.com/hackers/rutracker-hacked.html,8/15/2012,DNS Hijacking,Insufficient Authorization,Defacement,Torrent Site,,,,,,,,,,
-2012-333,WHID 2012-333: RUTracker Hacked,The Russian BitTorrent tracker RUTracker was recently hit by hackers.,http://www.esecurityplanet.com/hackers/rutracker-hacked.html,8/15/2012,DNS Hijacking,Insufficient Authorization,Defacement,Torrent Site,,,,,,,,,,
-2012-334,"WHID 2012-334: AT&T Hit by DDoS Attack, Suffers DNS Outage",A distributed denial-of-service attack aimed at AT&T's DNS (Domain Name System) servers has disrupted data traffic for some of the company's customers.,http://www.pcworld.com/article/260940/atandt_hit_by_ddos_attack_suffers_dns_outage.html,8/15/2012,Denial of Service,Insufficient Anti-automation,Downtime,Service Providers,,,,,,,,,,
-2012-334,"WHID 2012-334: AT&T Hit by DDoS Attack, Suffers DNS Outage",A distributed denial-of-service attack aimed at AT&T's DNS (Domain Name System) servers has disrupted data traffic for some of the company's customers.,http://www.pcworld.com/article/260940/atandt_hit_by_ddos_attack_suffers_dns_outage.html,8/15/2012,Denial of Service,Insufficient Anti-automation,Downtime,Service Providers,,,,,,,,,,
-2012-335,WHID 2012-335: Russia Today hit by DDoS as anti-Wikileaks group claims responsibility,"The Kremlin-funded channel, which featured Julian Assange as a talk-show host, says it has come under denial-of-service attack. Antileaks says it's responsible, but the timing could more to do with the Pussy Riot verdict than Wikileaks.",http://www.zdnet.com/russia-today-hit-by-ddos-as-anti-wikileaks-group-claims-responsibility-7000002794/,8/17/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,,,,,,,,,,
-2012-335,WHID 2012-335: Russia Today hit by DDoS as anti-Wikileaks group claims responsibility,"The Kremlin-funded channel, which featured Julian Assange as a talk-show host, says it has come under denial-of-service attack. Antileaks says it's responsible, but the timing could more to do with the Pussy Riot verdict than Wikileaks.",http://www.zdnet.com/russia-today-hit-by-ddos-as-anti-wikileaks-group-claims-responsibility-7000002794/,8/17/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,,,,,,,,,,
-2012-336,WHID 2012-336: Reuters website ???hacked??? for third time in month,"UK-based news agency Reuters has fallen victim to computer hackers for the third time in a month, with an article falsely claiming that Saudi Arabia's Foreign Minister Saud al-Faisal had died.",http://zeenews.india.com/news/world/reuters-website-hacked-for-third-time-in-month_794183.html,8/17/2012,Unknown,Unknown,Disinformation,Media,,,,,,,,,,
-2012-336,WHID 2012-336: Reuters website ???hacked??? for third time in month,"UK-based news agency Reuters has fallen victim to computer hackers for the third time in a month, with an article falsely claiming that Saudi Arabia's Foreign Minister Saud al-Faisal had died.",http://zeenews.india.com/news/world/reuters-website-hacked-for-third-time-in-month_794183.html,8/17/2012,Unknown,Unknown,Disinformation,Media,,,,,,,,,,
-2012-337,WHID 2012-337: Airport website hacked by ???neighbour???,"The website welcomed surfers with the picture of a wrecked plane captioned that it was of a crashin Mumbai with at least 1,000 casualties. But as they scrolled down the page, it was revealed that is was a joke.",http://www.dnaindia.com/mumbai/report_airport-website-hacked-by-neighbour_1728906,8/17/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-337,WHID 2012-337: Airport website hacked by ???neighbour???,"The website welcomed surfers with the picture of a wrecked plane captioned that it was of a crashin Mumbai with at least 1,000 casualties. But as they scrolled down the page, it was revealed that is was a joke.",http://www.dnaindia.com/mumbai/report_airport-website-hacked-by-neighbour_1728906,8/17/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-338,WHID 2012-338: Ugandan Prime Minister's Website Hacked,"The Ugandan prime minister's website was attacked by hackers on Tuesday and Wednesday, a government official has confirmed to the BBC.",http://reason.com/24-7/2012/08/17/ugandan-prime-ministers-website-hacked,8/17/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-338,WHID 2012-338: Ugandan Prime Minister's Website Hacked,"The Ugandan prime minister's website was attacked by hackers on Tuesday and Wednesday, a government official has confirmed to the BBC.",http://reason.com/24-7/2012/08/17/ugandan-prime-ministers-website-hacked,8/17/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-339,"WHID 2012-339: Activist website hacked, called 'dirty hippies'","A website curated by local activists was up and running again after being hacked by someone leaving a message about ""dirty hippies,"" the group said in an email to supporters Thursday.",http://www.utsandiego.com/news/2012/aug/16/activist-website-hacked-called-dirty-hippies/,8/16/2012,Unknown,Unknown,Defacement,Politics,,,,,,,,,,
-2012-339,"WHID 2012-339: Activist website hacked, called 'dirty hippies'","A website curated by local activists was up and running again after being hacked by someone leaving a message about ""dirty hippies,"" the group said in an email to supporters Thursday.",http://www.utsandiego.com/news/2012/aug/16/activist-website-hacked-called-dirty-hippies/,8/16/2012,Unknown,Unknown,Defacement,Politics,,,,,,,,,,
-2012-33,WHID 2012-33: Hackers hit Israel Prime Minister Office website,"Other websites of large Israeli institutions and businesses were also attacked yesterday. Attacks could be a prelude to a further, broader attack today.",http://www.haaretz.com/business/hackers-hit-israel-prime-minister-office-website-1.412769,2/13/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Israel,Yes,Distributed Denial of Service,1,UNreported,Unreported,Unreported,None,NA,
-2012-33,WHID 2012-33: Hackers hit Israel Prime Minister Office website,"Other websites of large Israeli institutions and businesses were also attacked yesterday. Attacks could be a prelude to a further, broader attack today.",http://www.haaretz.com/business/hackers-hit-israel-prime-minister-office-website-1.412769,2/13/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Israel,Yes,Distributed Denial of Service,1,UNreported,Unreported,Unreported,None,NA,
-2012-340,WHID 2012-34: Nonprofit reports hacker's theft from payroll system,Police Sgt. Jay Junghans said it appeared that someone had hacked into the nonprofit???s payroll system and made a fraudulent entry.,http://cjonline.com/news/2012-08-17/nonprofit-reports-hackers-theft-payroll-system,8/17/2012,Unknown,Unknown,Monetary Loss,Government,,,,,,,,,,
-2012-340,WHID 2012-34: Nonprofit reports hacker's theft from payroll system,Police Sgt. Jay Junghans said it appeared that someone had hacked into the nonprofit???s payroll system and made a fraudulent entry.,http://cjonline.com/news/2012-08-17/nonprofit-reports-hackers-theft-payroll-system,8/17/2012,Unknown,Unknown,Monetary Loss,Government,,,,,,,,,,
-2012-341,"WHID 2012-341: AMD Blog Site Hacked, Usernames, Encrypted Passwords Stolen","A group calling itself r00tbeer claims responsibility for the attack, which forced AMD to take the site offline and to change all the passwords.",http://www.eweek.com/c/a/Security/AMD-Blog-Site-Hacked-Usernames-Passwords-Stolen-794445/,8/20/2012,Unknown,Unknown,Leakage of Information,Blogs,,,,,,,,,,
-2012-341,"WHID 2012-341: AMD Blog Site Hacked, Usernames, Encrypted Passwords Stolen","A group calling itself r00tbeer claims responsibility for the attack, which forced AMD to take the site offline and to change all the passwords.",http://www.eweek.com/c/a/Security/AMD-Blog-Site-Hacked-Usernames-Passwords-Stolen-794445/,8/20/2012,Unknown,Unknown,Leakage of Information,Blogs,,,,,,,,,,
-2012-342,WHID 2012-342: Adventists Claim Hacker Swiped Manuscripts,"""Significantly, the SQL injection inquiries that were contained in the web server logs match exactly the SQL inquires posted on the Hack Forums by Knudson and the others,"" the complaint states. ""Structured Query Language,"" or SQL, refers to questions written in database language intended to extract the contents of the database, the Adventists say.",http://www.courthousenews.com/2012/08/22/49525.htm,8/22/2012,SQL Injection,Improper Input Handling,Leakage of Information,Religion,,,,,,,,,,
-2012-342,WHID 2012-342: Adventists Claim Hacker Swiped Manuscripts,"""Significantly, the SQL injection inquiries that were contained in the web server logs match exactly the SQL inquires posted on the Hack Forums by Knudson and the others,"" the complaint states. ""Structured Query Language,"" or SQL, refers to questions written in database language intended to extract the contents of the database, the Adventists say.",http://www.courthousenews.com/2012/08/22/49525.htm,8/22/2012,SQL Injection,Improper Input Handling,Leakage of Information,Religion,,,,,,,,,,
-2012-343,WHID 2012-343: MUN business school website hacked,"Student records may have been among information exposed during a breach at Memorial University's business school website, according to officials.",http://www.cbc.ca/news/canada/newfoundland-labrador/story/2012/08/23/nl-mun-business-website-hack-823.html,8/24/2012,Unknown,Unknown,Leakage of Information,Education,,,,,,,,,,
-2012-343,WHID 2012-343: MUN business school website hacked,"Student records may have been among information exposed during a breach at Memorial University's business school website, according to officials.",http://www.cbc.ca/news/canada/newfoundland-labrador/story/2012/08/23/nl-mun-business-website-hack-823.html,8/24/2012,Unknown,Unknown,Leakage of Information,Education,,,,,,,,,,
-2012-344,WHID 2012-344: GOVT HACKED OFF BY WEB BUG,"Last weekend the website www.gibraltar.gov.gi was hacked, albeit for a brief time.",http://www.chronicle.gi/headlines_details.php?id=25802,8/23/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-344,WHID 2012-344: GOVT HACKED OFF BY WEB BUG,"Last weekend the website www.gibraltar.gov.gi was hacked, albeit for a brief time.",http://www.chronicle.gi/headlines_details.php?id=25802,8/23/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-345,"WHID 2012-345: 1 MILLION accounts leaked in megahack on banks, websites",Hacker collective Team GhostShell leaked a cache of more than one million user account records from 100 websites over the weekend.,http://www.theregister.co.uk/2012/08/28/team_ghostshell_megahack/,8/28/2012,SQL Injection,Improper Input Handling,Leakage of Information,Finance,,Yes,,,,,,,,
-2012-345,"WHID 2012-345: 1 MILLION accounts leaked in megahack on banks, websites",Hacker collective Team GhostShell leaked a cache of more than one million user account records from 100 websites over the weekend.,http://www.theregister.co.uk/2012/08/28/team_ghostshell_megahack/,8/28/2012,SQL Injection,Improper Input Handling,Leakage of Information,Finance,,Yes,,,,,,,,
-2012-346,WHID 2012-346: Amnesty International Website Hacked,"Supporters of the Syrian government hacked the website of Amnesty International, posting items that falsely accused the rebels of a string of atrocities.",http://www.northjersey.com/news/international/167726365_Amnesty_International_Website_Hacked.html?page=all,8/28/2012,Unknown,Unknown,Disinformation,Blogs,,,,,,,,,,
-2012-346,WHID 2012-346: Amnesty International Website Hacked,"Supporters of the Syrian government hacked the website of Amnesty International, posting items that falsely accused the rebels of a string of atrocities.",http://www.northjersey.com/news/international/167726365_Amnesty_International_Website_Hacked.html?page=all,8/28/2012,Unknown,Unknown,Disinformation,Blogs,,,,,,,,,,
-2012-347,WHID 2012-347: South London Healthcare NHS Trust's website hacked,A London NHS trust had to take down its website after it was hacked. A message was written in Arabic on the South London Healthcare NHS Trust (SLHT) website on Wednesday night.,http://www.bbc.co.uk/news/uk-england-london-19413427,8/29/2012,Unknown,Unknown,Defacement,Healthcare,,,,,,,,,,
-2012-347,WHID 2012-347: South London Healthcare NHS Trust's website hacked,A London NHS trust had to take down its website after it was hacked. A message was written in Arabic on the South London Healthcare NHS Trust (SLHT) website on Wednesday night.,http://www.bbc.co.uk/news/uk-england-london-19413427,8/29/2012,Unknown,Unknown,Defacement,Healthcare,,,,,,,,,,
-2012-348,WHID 2012-348: Guangdong PSB Website Hacked,"Screenshot: A message on the hacked website of the Heyuan City Public Security Department, in Guangdong Province, says ???the Chinese Communist Party deserves a terrible death.??? The website was hacked from between Aug. 22 and Aug. 27, when it was taken down and repaired. (Aboluowang.com)",http://www.theepochtimes.com/n2/china-news/guangdong-psb-website-hacked-cheering-netizens-285263.html,8/28/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-348,WHID 2012-348: Guangdong PSB Website Hacked,"Screenshot: A message on the hacked website of the Heyuan City Public Security Department, in Guangdong Province, says ???the Chinese Communist Party deserves a terrible death.??? The website was hacked from between Aug. 22 and Aug. 27, when it was taken down and repaired. (Aboluowang.com)",http://www.theepochtimes.com/n2/china-news/guangdong-psb-website-hacked-cheering-netizens-285263.html,8/28/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-349,WHID 2012-349: Brighton shopping centre website hacked,The Churchill Square website has been displaying links to sexual enhancement drugs and hair loss treatment after being hacked.,http://www.theargus.co.uk/news/9901746.Sex__drugs_and_hair_loss_links_on_hacked_Brighton_shopping_centre_website/?ref=nt,8/30/2012,Unknown,Unknown,Spam Links,Retail,,,,,,,,,,
-2012-349,WHID 2012-349: Brighton shopping centre website hacked,The Churchill Square website has been displaying links to sexual enhancement drugs and hair loss treatment after being hacked.,http://www.theargus.co.uk/news/9901746.Sex__drugs_and_hair_loss_links_on_hacked_Brighton_shopping_centre_website/?ref=nt,8/30/2012,Unknown,Unknown,Spam Links,Retail,,,,,,,,,,
-2012-34,WHID 2012-34: Hackers Hit Anonymous's AnonyOps Website,"Reports have emerged that AnonyOps, a website associated with the hacktivist Anonymous collective, has been defaced by the hacker Exotz.",http://www.ibtimes.co.uk/articles/298417/20120214/hackers-hit-anonymous-anonyops-website.htm,2/14/2012,Unknown,Unknown,Defacement,Hacktivism,New York,Unreported,NA,1,Unreported,Unreported,Unreported,None,NA,
-2012-34,WHID 2012-34: Hackers Hit Anonymous's AnonyOps Website,"Reports have emerged that AnonyOps, a website associated with the hacktivist Anonymous collective, has been defaced by the hacker Exotz.",http://www.ibtimes.co.uk/articles/298417/20120214/hackers-hit-anonymous-anonyops-website.htm,2/14/2012,Unknown,Unknown,Defacement,Hacktivism,New York,Unreported,NA,1,Unreported,Unreported,Unreported,None,NA,
-2012-350,WHID 2012-350: Guild Wars 2 Accounts Hacked,"We're seeing an uptick in reports of account theft and attempted account theft. We believe hackers are using databases of email addresses and passwords stolen from other games and web sites, and pre-existing trojan horses, to search for matching Guild Wars 2 accounts which they attempt to compromise. To prevent this, we have temporarily disabled the 'reset password' feature, and we're working to bring email authentication online",http://www.esecurityplanet.com/hackers/guild-wars-2-accounts-hacked.html,8/30/2012,Stolen Credentials,Insufficient Authentication,Account Takeover,Gaming,,,,,,,,,,
-2012-350,WHID 2012-350: Guild Wars 2 Accounts Hacked,"We're seeing an uptick in reports of account theft and attempted account theft. We believe hackers are using databases of email addresses and passwords stolen from other games and web sites, and pre-existing trojan horses, to search for matching Guild Wars 2 accounts which they attempt to compromise. To prevent this, we have temporarily disabled the 'reset password' feature, and we're working to bring email authentication online",http://www.esecurityplanet.com/hackers/guild-wars-2-accounts-hacked.html,8/30/2012,Stolen Credentials,Insufficient Authentication,Account Takeover,Gaming,,,,,,,,,,
-2012-351,WHID 2012-351: Hacker makes abusive bank account attack,"""Our investigation has indicated that his account was accessed by an unknown third party. Our fraud detection systems recognised the threat, meaning that no money was able to be withdrawn.",http://www.eveningtimes.co.uk/news/hacker-makes-abusive-bank-account-attack.18721478,8/29/2012,Unknown,Unknown,Defacement,Finance,,,,,,,,,,
-2012-351,WHID 2012-351: Hacker makes abusive bank account attack,"""Our investigation has indicated that his account was accessed by an unknown third party. Our fraud detection systems recognised the threat, meaning that no money was able to be withdrawn.",http://www.eveningtimes.co.uk/news/hacker-makes-abusive-bank-account-attack.18721478,8/29/2012,Unknown,Unknown,Defacement,Finance,,,,,,,,,,
-2012-352,WHID 2012-352: Hacker???s Overnight Attack South London Healthcare NHS Trust's Website,"Arabic Service reports are confirming hacking of a London NHS trust, which was down for a night reading the message: Group HP-Hack in red letters with displayed images of the Syrian civil war.",http://topnews.ae/content/212832-hacker-s-overnight-attack-south-london-healthcare-nhs-trusts-website,8/30/2012,Unknown,Unknown,Defacement,Healthcare,,,,,,,,,,
-2012-352,WHID 2012-352: Hacker???s Overnight Attack South London Healthcare NHS Trust's Website,"Arabic Service reports are confirming hacking of a London NHS trust, which was down for a night reading the message: Group HP-Hack in red letters with displayed images of the Syrian civil war.",http://topnews.ae/content/212832-hacker-s-overnight-attack-south-london-healthcare-nhs-trusts-website,8/30/2012,Unknown,Unknown,Defacement,Healthcare,,,,,,,,,,
-2012-353,WHID 2012-353: University IT blunder sparks hacking fears,On 24th and 29th August respectively both Cambridge University and Africa College Leeds (a research partnership affiliated to the University of Leeds working to improve food sources in sub-Saharan Africa) websites were infiltrated by hackers.,http://oxfordstudent.com/2012/08/31/university-computer-systems-hacked/,8/31/2012,Unknown,Unknown,Leakage of Information,Education,,,,,,,,,,
-2012-353,WHID 2012-353: University IT blunder sparks hacking fears,On 24th and 29th August respectively both Cambridge University and Africa College Leeds (a research partnership affiliated to the University of Leeds working to improve food sources in sub-Saharan Africa) websites were infiltrated by hackers.,http://oxfordstudent.com/2012/08/31/university-computer-systems-hacked/,8/31/2012,Unknown,Unknown,Leakage of Information,Education,,,,,,,,,,
-2012-354,"WHID 2012-354: Toyota Employee Allegedly Hacked, Stole Confidential Information",Investigation is now underway into whether a computer programmer allegedly stole proprietary information from the automaker Toyota and ???sabotaged??? the company???s supplier computer network after being terminated last week.,http://threatpost.com/en_us/blogs/toyota-employee-allegedly-hacked-stole-confidential-information-083112,8/31/2012,Stolen Credentials,Insufficient Authentication,Leakage of Information,Automotive,,,,,,,,,,
-2012-354,"WHID 2012-354: Toyota Employee Allegedly Hacked, Stole Confidential Information",Investigation is now underway into whether a computer programmer allegedly stole proprietary information from the automaker Toyota and ???sabotaged??? the company???s supplier computer network after being terminated last week.,http://threatpost.com/en_us/blogs/toyota-employee-allegedly-hacked-stole-confidential-information-083112,8/31/2012,Stolen Credentials,Insufficient Authentication,Leakage of Information,Automotive,,,,,,,,,,
-2012-355,WHID 2012-355: Data stolen after Hertfordshire Constabulary website hacked,Hertfordshire Constabulary ???s website has been hacked and data from it published on internet by activists thought to be linked with WikiLeaks founder Julian Assange.,http://www.times-series.co.uk/news/9905085.Data_stolen_after_Hertfordshire_Constabulary_website_hacked/,9/1/2012,Unknown,Unknown,Leakage of Information,Government,,,,,,,,,,
-2012-355,WHID 2012-355: Data stolen after Hertfordshire Constabulary website hacked,Hertfordshire Constabulary ???s website has been hacked and data from it published on internet by activists thought to be linked with WikiLeaks founder Julian Assange.,http://www.times-series.co.uk/news/9905085.Data_stolen_after_Hertfordshire_Constabulary_website_hacked/,9/1/2012,Unknown,Unknown,Leakage of Information,Government,,,,,,,,,,
-2012-356,WHID 2012-356: Hackers deface MWSS site over high water rates,"Hackers claiming to be a Philippine chapter of the hacktivist collective Anonymous defaced the website of the Metropolitan Waterworks and Sewerage System (MWSS) over the weekend, supposedly over unjustified high charges by the agency's concessionaires.",http://www.gmanetwork.com/news/story/272170/scitech/technology/hackers-deface-mwss-site-over-high-water-rates,9/1/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-356,WHID 2012-356: Hackers deface MWSS site over high water rates,"Hackers claiming to be a Philippine chapter of the hacktivist collective Anonymous defaced the website of the Metropolitan Waterworks and Sewerage System (MWSS) over the weekend, supposedly over unjustified high charges by the agency's concessionaires.",http://www.gmanetwork.com/news/story/272170/scitech/technology/hackers-deface-mwss-site-over-high-water-rates,9/1/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-357,"WHID 2012-357: Hacker hands Barto manufacturer $190,000 loss","A hacker broke into a Berks County manufacturer's computer system and stole nearly $200,000, according to state police.",http://readingeagle.com/article.aspx?id=412706,9/3/2012,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,,,,,,,,,,
-2012-357,"WHID 2012-357: Hacker hands Barto manufacturer $190,000 loss","A hacker broke into a Berks County manufacturer's computer system and stole nearly $200,000, according to state police.",http://readingeagle.com/article.aspx?id=412706,9/3/2012,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,,,,,,,,,,
-2012-358,WHID 2012-358: WikiLeaks supporters take down Swedish government sites with DDOS attacks,"Multiple government and media websites in Sweden were taken down today by coordinated Distributed Denial of Service (DDoS) attacks at around 10AM local time. The Swedish Armed Forces, Sweden.se, the Swedish Institute, and the Swedish Courts websites were among those affected. At the time of writing, the first two were down while the other two were up, but that doesn???t mean much as the sites have been going in and out all day.",http://thenextweb.com/insider/2012/09/03/wikileaks-supporters-take-swedish-government-sites-ddos-attacks/,9/3/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,,,,,,,,,,
-2012-358,WHID 2012-358: WikiLeaks supporters take down Swedish government sites with DDOS attacks,"Multiple government and media websites in Sweden were taken down today by coordinated Distributed Denial of Service (DDoS) attacks at around 10AM local time. The Swedish Armed Forces, Sweden.se, the Swedish Institute, and the Swedish Courts websites were among those affected. At the time of writing, the first two were down while the other two were up, but that doesn???t mean much as the sites have been going in and out all day.",http://thenextweb.com/insider/2012/09/03/wikileaks-supporters-take-swedish-government-sites-ddos-attacks/,9/3/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,,,,,,,,,,
-2012-359,WHID 2012-359: Sony Mobile's website hacked,"A group of hackers known as the Null Crew have laid claim to eight Sony servers, citing the company's notoriously 'lax security.'",http://www.afterdawn.com/news/article.cfm/2012/09/03/sony_mobile_s_website_hacked,9/3/2012,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,,,,,,,,,,
-2012-359,WHID 2012-359: Sony Mobile's website hacked,"A group of hackers known as the Null Crew have laid claim to eight Sony servers, citing the company's notoriously 'lax security.'",http://www.afterdawn.com/news/article.cfm/2012/09/03/sony_mobile_s_website_hacked,9/3/2012,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,,,,,,,,,,
-2012-35,"WHID 2012-35: The Herald website hacked, used to propagate pornography","The Herald website, www.herald.co.zw, was compromised and used to host links to pornography sites.",http://www.techzim.co.zw/2012/02/the-herald-website-hacked-used-to-propagate-pornography/,2/15/2012,Unknown,Unknown,Spam,Media,Zimbabwe,Unreported,NA,1,Unreported,Unreported,Unreported,None,NA,
-2012-35,"WHID 2012-35: The Herald website hacked, used to propagate pornography","The Herald website, www.herald.co.zw, was compromised and used to host links to pornography sites.",http://www.techzim.co.zw/2012/02/the-herald-website-hacked-used-to-propagate-pornography/,2/15/2012,Unknown,Unknown,Spam,Media,Zimbabwe,Unreported,NA,1,Unreported,Unreported,Unreported,None,NA,
-2012-360,WHID 2012-360: Qatar's Al Jazeera website hacked by Syria's Assad loyalists,"The website of Qatar-based satellite news network Al Jazeera was apparently hacked on Tuesday by Syrian government loyalists for what they said was the television channel's support for the ""armed terrorist groups and spreading lies and fabricated news"".",http://www.reuters.com/article/2012/09/04/us-qatar-jazeera-hacking-idUSBRE8830ZI20120904,9/4/2012,Unknown,Unknown,Defacement,Media,,,,,,,,,,
-2012-360,WHID 2012-360: Qatar's Al Jazeera website hacked by Syria's Assad loyalists,"The website of Qatar-based satellite news network Al Jazeera was apparently hacked on Tuesday by Syrian government loyalists for what they said was the television channel's support for the ""armed terrorist groups and spreading lies and fabricated news"".",http://www.reuters.com/article/2012/09/04/us-qatar-jazeera-hacking-idUSBRE8830ZI20120904,9/4/2012,Unknown,Unknown,Defacement,Media,,,,,,,,,,
-2012-361,"WHID 2012-361: Anonymous Hackers Hit Siemens, Fujitsu","""The hackers have published massive amounts of data -- including some e-mail addresses, usernames and passwords -- allegedly stolen from these Web sites,"" writes Softpedia's Eduard Kovacs. ""Judging by the files posted on PrivatePaste, it appears that the attackers once again leveraged SQL Injection vulnerabilities to breach the sites and gain access to their databases.""",http://www.esecurityplanet.com/hackers/anonymous-hackers-hit-siemens-fujitsu.html,9/4/2012,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,,,,,,,,,
-2012-361,"WHID 2012-361: Anonymous Hackers Hit Siemens, Fujitsu","""The hackers have published massive amounts of data -- including some e-mail addresses, usernames and passwords -- allegedly stolen from these Web sites,"" writes Softpedia's Eduard Kovacs. ""Judging by the files posted on PrivatePaste, it appears that the attackers once again leveraged SQL Injection vulnerabilities to breach the sites and gain access to their databases.""",http://www.esecurityplanet.com/hackers/anonymous-hackers-hit-siemens-fujitsu.html,9/4/2012,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,,,,,,,,,
-2012-362,"WHID 2012-362: Hackers steal $250,000 from BitFloor exchange","The US's biggest BitCoin trading exchange, BitFloor, has been forced to temporarily shut up shop, after a virtual heist in which the equivalent of $250,000 was stolen.",http://www.tgdaily.com/business-and-law-features/65934-hackers-steal-250000-from-bitfloor-exchange,9/5/2012,Unknown,Unknown,Monetary Loss,Finance,,,,,,,,,,
-2012-362,"WHID 2012-362: Hackers steal $250,000 from BitFloor exchange","The US's biggest BitCoin trading exchange, BitFloor, has been forced to temporarily shut up shop, after a virtual heist in which the equivalent of $250,000 was stolen.",http://www.tgdaily.com/business-and-law-features/65934-hackers-steal-250000-from-bitfloor-exchange,9/5/2012,Unknown,Unknown,Monetary Loss,Finance,,,,,,,,,,
-2012-363,WHID 2012-363: Nova Scotia Web site clobbered by virus,A SQL injection attack took down the provincial lobbyist registry site several weeks ago. A government spokesperson says viruses sometimes slip through between software updates,http://www.itworldcanada.com/news/nova-scotia-web-site-clobbered-by-virus/146080,9/6/2012,Stolen Credentials,Improper Input Handling,Downtime,Government,,,,,,,,,,
-2012-363,WHID 2012-363: Nova Scotia Web site clobbered by virus,A SQL injection attack took down the provincial lobbyist registry site several weeks ago. A government spokesperson says viruses sometimes slip through between software updates,http://www.itworldcanada.com/news/nova-scotia-web-site-clobbered-by-virus/146080,9/6/2012,Stolen Credentials,Improper Input Handling,Downtime,Government,,,,,,,,,,
-2012-364,WHID 2012-364: Thousands of 'Guild Wars 2' accounts hacked,"ArenaNet ??? the company behind the massively multiplayer online game ??? has told players that hackers are actively trying to get into accounts and appear to have cracked more than 11,000 already.",http://www.nbcnews.com/technology/ingame/thousands-guild-wars-2-accounts-hacked-985019,9/6/2012,Stolen Credentials,Insufficient Authentication,Account Takeover,Gaming,,,,,,,,,,
-2012-364,WHID 2012-364: Thousands of 'Guild Wars 2' accounts hacked,"ArenaNet ??? the company behind the massively multiplayer online game ??? has told players that hackers are actively trying to get into accounts and appear to have cracked more than 11,000 already.",http://www.nbcnews.com/technology/ingame/thousands-guild-wars-2-accounts-hacked-985019,9/6/2012,Stolen Credentials,Insufficient Authentication,Account Takeover,Gaming,,,,,,,,,,
-2012-365,WHID 2012-365: Al Jazeera???s mobile news service hacked,"Al Jazeera news network's mobile service was hacked today, as per a report by AFP. This development comes barely a week after a number of its websites were hacked by Syria???s Assad loyalists, it reported on its website al-jazeera.net.",http://tech2.in.com/news/general/al-jazeeras-mobile-news-service-hacked/424632,9/10/2012,Unknown,Unknown,Disinformation,Media,,,,,,,,,,
-2012-365,WHID 2012-365: Al Jazeera???s mobile news service hacked,"Al Jazeera news network's mobile service was hacked today, as per a report by AFP. This development comes barely a week after a number of its websites were hacked by Syria???s Assad loyalists, it reported on its website al-jazeera.net.",http://tech2.in.com/news/general/al-jazeeras-mobile-news-service-hacked/424632,9/10/2012,Unknown,Unknown,Disinformation,Media,,,,,,,,,,
-2012-366,WHID 2012-366: Hacker suspected of stealing scores of court documents,"""I accidently typed in a wrong case number and saw that I could access other cases. Some of them I just passed on to acquaintances. It's what you do today ??? like Twitter.""","http://www.ynetnews.com/articles/0,7340,L-4279655,00.html",9/10/2012,Predictable Resource Location,Insufficient Authorization,Leakage of Information,Government,,,,,,,,,,
-2012-366,WHID 2012-366: Hacker suspected of stealing scores of court documents,"""I accidently typed in a wrong case number and saw that I could access other cases. Some of them I just passed on to acquaintances. It's what you do today ??? like Twitter.""","http://www.ynetnews.com/articles/0,7340,L-4279655,00.html",9/10/2012,Predictable Resource Location,Insufficient Authorization,Leakage of Information,Government,,,,,,,,,,
-2012-367,"WHID 2012-367: Dominos' India website hacked, customer info leaked","Domino???s India website was hacked using the SQL injection method and remote file inclusion, one of the most common methods for stealing private data from web databases. Through this, the hacker typically tricks the site???s database into revealing data that should be hidden by ???injecting??? certain commands.",http://business-standard.com/india/news/dominos-india-website-hacked-customer-info-leaked/486057/,9/11/2012,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2012-367,"WHID 2012-367: Dominos' India website hacked, customer info leaked","Domino???s India website was hacked using the SQL injection method and remote file inclusion, one of the most common methods for stealing private data from web databases. Through this, the hacker typically tricks the site???s database into revealing data that should be hidden by ???injecting??? certain commands.",http://business-standard.com/india/news/dominos-india-website-hacked-customer-info-leaked/486057/,9/11/2012,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2012-368,WHID 2012-368: GoDaddy stopped by massive DDoS attack,A lone hacker has claimed responsibility for an ongoing denial-of-service attack that may have knocked out millions of websites hosted by world's largest domain registrar GoDaddy.,http://www.theregister.co.uk/2012/09/10/godaddy_ddos_attack/,9/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Service Providers,,,,,,,,,,
-2012-368,WHID 2012-368: GoDaddy stopped by massive DDoS attack,A lone hacker has claimed responsibility for an ongoing denial-of-service attack that may have knocked out millions of websites hosted by world's largest domain registrar GoDaddy.,http://www.theregister.co.uk/2012/09/10/godaddy_ddos_attack/,9/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Service Providers,,,,,,,,,,
-2012-369,WHID 2012-369: Mexico hackers hit official websites in cyber protest,Mexican computer hackers have taken over at least ten government and other websites in a political protest marking the country's independence day.,http://www.bbc.co.uk/news/world-latin-america-19618459,9/16/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-369,WHID 2012-369: Mexico hackers hit official websites in cyber protest,Mexican computer hackers have taken over at least ten government and other websites in a political protest marking the country's independence day.,http://www.bbc.co.uk/news/world-latin-america-19618459,9/16/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-36,"WHID 2012-36: Houston County website hacked, investigation ongoing",Houston County???s official website is indefinitely down for maintenance after being hacked early Monday morning.,http://www2.dothaneagle.com/news/2012/feb/20/houston-county-website-hacked-investigation-ongoin-ar-3266922/,2/20/2012,Unknown,Unknown,Downtime,Government,"Houston, TX",No,NA,1,Unreported,Unreported,Unreported,None,NA,
-2012-36,"WHID 2012-36: Houston County website hacked, investigation ongoing",Houston County???s official website is indefinitely down for maintenance after being hacked early Monday morning.,http://www2.dothaneagle.com/news/2012/feb/20/houston-county-website-hacked-investigation-ongoin-ar-3266922/,2/20/2012,Unknown,Unknown,Downtime,Government,"Houston, TX",No,NA,1,Unreported,Unreported,Unreported,None,NA,
-2012-370,WHID 2012-370: Hacker Steals $140k From Lock Poker Account,"However, unbeknownst to MicahJ, it was in fact an .exe file possibly complete with a keylogger program which then accessed all sensitive information on his computer.",http://www.onlinepoker.net/poker-news/general-poker-news/hacker-steals-140k-lock-poker-account/16705,9/18/2012,Stolen Credentials,Insufficient Authentication,Monetary Loss,Gaming,,,,,,,,,,
-2012-370,WHID 2012-370: Hacker Steals $140k From Lock Poker Account,"However, unbeknownst to MicahJ, it was in fact an .exe file possibly complete with a keylogger program which then accessed all sensitive information on his computer.",http://www.onlinepoker.net/poker-news/general-poker-news/hacker-steals-140k-lock-poker-account/16705,9/18/2012,Stolen Credentials,Insufficient Authentication,Monetary Loss,Gaming,,,,,,,,,,
-2012-371,"WHID 2012-371: Bank of America Website Hacked, Islamic Cyber Terrorists Takes Credit","The Bank of America website was possibly hacked with customers experiencing intermittent problems most of Tuesday, the same time an Islamic cyber-terrorist group threatened to attack the bank, New York Stock Exchange and other U.S. targets.",http://www.foodworldnews.com/articles/2197/20120918/bank-of-america-website-hacked-islamic-cyber-terrorists-takes-credit.htm,9/18/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-371,"WHID 2012-371: Bank of America Website Hacked, Islamic Cyber Terrorists Takes Credit","The Bank of America website was possibly hacked with customers experiencing intermittent problems most of Tuesday, the same time an Islamic cyber-terrorist group threatened to attack the bank, New York Stock Exchange and other U.S. targets.",http://www.foodworldnews.com/articles/2197/20120918/bank-of-america-website-hacked-islamic-cyber-terrorists-takes-credit.htm,9/18/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-372,"WHID 2012-372: Chase, NYSE Websites Targeted in Cyber Attacks",J.P. Morgan Chase (JPM) and NYSE Euronext (NYX) experienced website trouble Wednesday after being targeted by apparent cyber attacks. The problems come a day after Bank of America experienced prolonged issues following a separate attack. Read more: http://www.foxbusiness.com/industries/2012/09/19/chase-website-experiences-intermittent-troubles/#ixzz2CntAd4Pz,http://www.foxbusiness.com/industries/2012/09/19/chase-website-experiences-intermittent-troubles/,9/19/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-372,"WHID 2012-372: Chase, NYSE Websites Targeted in Cyber Attacks",J.P. Morgan Chase (JPM) and NYSE Euronext (NYX) experienced website trouble Wednesday after being targeted by apparent cyber attacks. The problems come a day after Bank of America experienced prolonged issues following a separate attack. Read more: http://www.foxbusiness.com/industries/2012/09/19/chase-website-experiences-intermittent-troubles/#ixzz2CntAd4Pz,http://www.foxbusiness.com/industries/2012/09/19/chase-website-experiences-intermittent-troubles/,9/19/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-373,WHID 2012-373: Virgin Mobile PIN Brute Force Attack Issue Addressed by Sprint,"Sprint, the mobile carrier that owns Virgin Mobile, claims to have addressed the PIN brute force attack issue discovered by Kevin Burke. However, the expert claims that more measures should be implemented.",http://news.softpedia.com/news/Virgin-Mobile-PIN-Brute-Force-Attack-Issue-Addressed-by-Sprint-293560.shtml,9/20/2012,Brute Force,Insufficient Anti-automation,Leakage of Information,Telecommunications,,,,,,,,,,
-2012-373,WHID 2012-373: Virgin Mobile PIN Brute Force Attack Issue Addressed by Sprint,"Sprint, the mobile carrier that owns Virgin Mobile, claims to have addressed the PIN brute force attack issue discovered by Kevin Burke. However, the expert claims that more measures should be implemented.",http://news.softpedia.com/news/Virgin-Mobile-PIN-Brute-Force-Attack-Issue-Addressed-by-Sprint-293560.shtml,9/20/2012,Brute Force,Insufficient Anti-automation,Leakage of Information,Telecommunications,,,,,,,,,,
-2012-374,WHID 2012-374: Japanese Web sites attacked in tense dispute with China,"The territorial dispute between Japan and China has escalated into cyberattacks, Japan-based reports say.",http://news.cnet.com/8301-1009_3-57517128-83/japanese-web-sites-attacked-in-tense-dispute-with-china/,9/20/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,,,,,,,,,,
-2012-374,WHID 2012-374: Japanese Web sites attacked in tense dispute with China,"The territorial dispute between Japan and China has escalated into cyberattacks, Japan-based reports say.",http://news.cnet.com/8301-1009_3-57517128-83/japanese-web-sites-attacked-in-tense-dispute-with-china/,9/20/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,,,,,,,,,,
-2012-375,WHID 2012-375: Hackers Get Personal Data From Navy Website,"Hackers accessed personal information of more than 200,000 service members earlier this year and posted a sampling of the data online.",http://www.military.com/daily-news/2012/09/21/hackers-get-personal-data-from-navy-website.html,9/21/2012,Unknown,Unknown,Leakage of Information,Government,,,,,,,,,,
-2012-375,WHID 2012-375: Hackers Get Personal Data From Navy Website,"Hackers accessed personal information of more than 200,000 service members earlier this year and posted a sampling of the data online.",http://www.military.com/daily-news/2012/09/21/hackers-get-personal-data-from-navy-website.html,9/21/2012,Unknown,Unknown,Leakage of Information,Government,,,,,,,,,,
-2012-376,WHID 2012-376: American Chamber of Commerce in France Hacked,The hackers say they published e-mail addresses and passwords only after their warnings about a SQL injection error were ignored.,http://www.esecurityplanet.com/hackers/american-chamber-of-commerce-in-france-hacked.html,9/21/2012,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2012-376,WHID 2012-376: American Chamber of Commerce in France Hacked,The hackers say they published e-mail addresses and passwords only after their warnings about a SQL injection error were ignored.,http://www.esecurityplanet.com/hackers/american-chamber-of-commerce-in-france-hacked.html,9/21/2012,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2012-377,"WHID 2012-377: Hackers deface old UTS system, dump user database","Hackers broke into a subdomain used by the University of Technology, Sydney, over the weekend, and dumped the contents of a database from an old content management system.",http://www.zdnet.com/au/hackers-deface-old-uts-system-dump-user-database-7000004694/,9/24/2012,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2012-377,"WHID 2012-377: Hackers deface old UTS system, dump user database","Hackers broke into a subdomain used by the University of Technology, Sydney, over the weekend, and dumped the contents of a database from an old content management system.",http://www.zdnet.com/au/hackers-deface-old-uts-system-dump-user-database-7000004694/,9/24/2012,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2012-378,WHID 2012-378: Thieves use DDoS to distract banks during cyber heists,A DDoS attack on a bank???s website could very well be a precursor to a wire transfer raid.,http://www.cso.com.au/article/437372/thieves_use_ddos_distract_banks_during_cyber_heists/#closeme,9/25/2012,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,,,,,,,,,,
-2012-378,WHID 2012-378: Thieves use DDoS to distract banks during cyber heists,A DDoS attack on a bank???s website could very well be a precursor to a wire transfer raid.,http://www.cso.com.au/article/437372/thieves_use_ddos_distract_banks_during_cyber_heists/#closeme,9/25/2012,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,,,,,,,,,,
-2012-379,WHID 2012-379: Wells Fargo becomes latest bank to be hacked by cyber gang seeking revenge for anti-Islam film Read more: http://www.dailymail.co.uk/news/article-2209403/Wells-Fargo-reveal-website-hacked-cyber-gang-seeking-revenge-anti-Islam-film.html#ixzz2CoFkyink Follow us: @MailOnline on Twitter | DailyMail on Facebook,Wells Fargo has become the latest bank to be targeted by a cyber gang seeking revenge for the anti-Islam film Innocence of Muslims,http://www.dailymail.co.uk/news/article-2209403/Wells-Fargo-reveal-website-hacked-cyber-gang-seeking-revenge-anti-Islam-film.html?ito=feeds-newsxml,9/27/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-379,WHID 2012-379: Wells Fargo becomes latest bank to be hacked by cyber gang seeking revenge for anti-Islam film Read more: http://www.dailymail.co.uk/news/article-2209403/Wells-Fargo-reveal-website-hacked-cyber-gang-seeking-revenge-anti-Islam-film.html#ixzz2CoFkyink Follow us: @MailOnline on Twitter | DailyMail on Facebook,Wells Fargo has become the latest bank to be targeted by a cyber gang seeking revenge for the anti-Islam film Innocence of Muslims,http://www.dailymail.co.uk/news/article-2209403/Wells-Fargo-reveal-website-hacked-cyber-gang-seeking-revenge-anti-Islam-film.html?ito=feeds-newsxml,9/27/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-37,WHID 2012-37: AFL Website Hacked,The AFL is a little embarrassed and users surprised by a message replacing the normal screen.,http://www.triplem.com.au/sydney/sport/afl/news/blog/afl-website-hacked-with-demetriou-is-eddies-bitch-message/20120221-fo0o.html,2/21/2012,Unknown,Unknown,Downtime,Sports,Australia,Unreported,NA,1,Unreported,Unreported,Unreported,None,NA,
-2012-37,WHID 2012-37: AFL Website Hacked,The AFL is a little embarrassed and users surprised by a message replacing the normal screen.,http://www.triplem.com.au/sydney/sport/afl/news/blog/afl-website-hacked-with-demetriou-is-eddies-bitch-message/20120221-fo0o.html,2/21/2012,Unknown,Unknown,Downtime,Sports,Australia,Unreported,NA,1,Unreported,Unreported,Unreported,None,NA,
-2012-380,WHID 2012-380: Cyber attack takes down PNC website for second day,"For the second consecutive day, the Pittsburgh-based bank's website fell victim to a denial-of-service attack, in which a person or group directs a flood of traffic to a website, overwhelming the system and preventing customers from gaining access.",http://www.equities.com/news/headline-story?dt=2012-09-27&val=533911&cat=finance,9/28/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-380,WHID 2012-380: Cyber attack takes down PNC website for second day,"For the second consecutive day, the Pittsburgh-based bank's website fell victim to a denial-of-service attack, in which a person or group directs a flood of traffic to a website, overwhelming the system and preventing customers from gaining access.",http://www.equities.com/news/headline-story?dt=2012-09-27&val=533911&cat=finance,9/28/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-381,WHID 2012-381: Cybercriminals Hijack 4.5 Million ADLS Modems in Brazil to Serve Malware,"The security hole allows an attacker to perform a cross-site request forgery (CSRF) in the administration panel of the device to capture the access password. Once they obtained the password, the crooks altered the modem???s DNS settings to make sure that when users wanted to visit certain websites, they would be served malicious files",http://news.softpedia.com/news/Cybercriminals-Hijack-4-5-Million-ADLS-Modems-in-Brazil-to-Serve-Malware-295845.shtml,10/1/2012,Cross-site Request Forgery (CSRF),Insufficient Process Validation,DNS Redirection,Technology,,,,,,,,,,
-2012-381,WHID 2012-381: Cybercriminals Hijack 4.5 Million ADLS Modems in Brazil to Serve Malware,"The security hole allows an attacker to perform a cross-site request forgery (CSRF) in the administration panel of the device to capture the access password. Once they obtained the password, the crooks altered the modem???s DNS settings to make sure that when users wanted to visit certain websites, they would be served malicious files",http://news.softpedia.com/news/Cybercriminals-Hijack-4-5-Million-ADLS-Modems-in-Brazil-to-Serve-Malware-295845.shtml,10/1/2012,Cross-site Request Forgery (CSRF),Insufficient Process Validation,DNS Redirection,Technology,,,,,,,,,,
-2012-382,WHID 2012-382: GhostShell university hack: By the numbers,"hacktivist group GhostShell claimed to have breached 100 top university servers, releasing 120,000 records. But how much information was sensitive?",http://www.zdnet.com/ghostshell-university-hack-by-the-numbers-7000005194/,10/2/2012,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2012-382,WHID 2012-382: GhostShell university hack: By the numbers,"hacktivist group GhostShell claimed to have breached 100 top university servers, releasing 120,000 records. But how much information was sensitive?",http://www.zdnet.com/ghostshell-university-hack-by-the-numbers-7000005194/,10/2/2012,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2012-383,WHID 2012-383: Wagamama Hacked,Visitors were redirected to sites infected with the Blackhole exploit kit.,http://www.esecurityplanet.com/hackers/wagamama-hacked.html,10/2/2012,Unknown,Unknown,Planting of Malware,Retail,,,,,,,,,,
-2012-383,WHID 2012-383: Wagamama Hacked,Visitors were redirected to sites infected with the Blackhole exploit kit.,http://www.esecurityplanet.com/hackers/wagamama-hacked.html,10/2/2012,Unknown,Unknown,Planting of Malware,Retail,,,,,,,,,,
-2012-384,WHID 2012-384: Hackers hit Philippine govt sites again,"The government Web sites were defaced by three separate hacker groups, which were protesting against the country's cybercrime law among other reasons.",http://www.zdnet.com/ph/hackers-hit-philippine-govt-sites-again-7000005364/,10/8/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-384,WHID 2012-384: Hackers hit Philippine govt sites again,"The government Web sites were defaced by three separate hacker groups, which were protesting against the country's cybercrime law among other reasons.",http://www.zdnet.com/ph/hackers-hit-philippine-govt-sites-again-7000005364/,10/8/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-385,WHID 2012-385: Capital One Latest Victim in Ongoing Cyber Attack,"???I can confirm that Capital One is experiencing online systems issues due to a denial of service attack,??? a spokesperson from the bank told FOX Business. Read more: http://www.foxbusiness.com/technology/2012/10/09/capitol-one-confirms-cyber-attack/#ixzz2CoV3KILM",http://www.foxbusiness.com/technology/2012/10/09/capitol-one-confirms-cyber-attack/,10/9/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-385,WHID 2012-385: Capital One Latest Victim in Ongoing Cyber Attack,"???I can confirm that Capital One is experiencing online systems issues due to a denial of service attack,??? a spokesperson from the bank told FOX Business. Read more: http://www.foxbusiness.com/technology/2012/10/09/capitol-one-confirms-cyber-attack/#ixzz2CoV3KILM",http://www.foxbusiness.com/technology/2012/10/09/capitol-one-confirms-cyber-attack/,10/9/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-386,WHID 2012-386: SunTrust Is Latest Attack Victim,SunTrust Banks became the seventh U.S. financial institution apparently hit by a distributed denial of service attack orchestrated by the hacktivist group Izz ad-Din al-Qassam.,http://www.bankinfosecurity.com/suntrust-latest-attack-victim-a-5184,10/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-386,WHID 2012-386: SunTrust Is Latest Attack Victim,SunTrust Banks became the seventh U.S. financial institution apparently hit by a distributed denial of service attack orchestrated by the hacktivist group Izz ad-Din al-Qassam.,http://www.bankinfosecurity.com/suntrust-latest-attack-victim-a-5184,10/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-387,WHID 2012-387: Hackers Target PlaySpan's Real World Marketplace,The PlaySpan hackers released details for two million accounts online,http://www.escapistmagazine.com/news/view/120062-Hackers-Target-PlaySpans-Real-World-Marketplace,10/11/2012,SQL Injection,Improper Input Handling,Leakage of Information,Gaming,,,,,,,,,,
-2012-387,WHID 2012-387: Hackers Target PlaySpan's Real World Marketplace,The PlaySpan hackers released details for two million accounts online,http://www.escapistmagazine.com/news/view/120062-Hackers-Target-PlaySpans-Real-World-Marketplace,10/11/2012,SQL Injection,Improper Input Handling,Leakage of Information,Gaming,,,,,,,,,,
-2012-388,WHID 2012-388: Regions Bank Confirms Online Outage,Regions Financial Corp. on Oct. 11 confirmed its online banking and corporate websites were suffering intermittent outages related to an Internet service disruption.,http://www.bankinfosecurity.com/regions-bank-confirms-online-outage-a-5189,10/11/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-388,WHID 2012-388: Regions Bank Confirms Online Outage,Regions Financial Corp. on Oct. 11 confirmed its online banking and corporate websites were suffering intermittent outages related to an Internet service disruption.,http://www.bankinfosecurity.com/regions-bank-confirms-online-outage-a-5189,10/11/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-389,WHID 2012-389: Facebook (FB) Said to Be Having Technical Issues in Europe Due to Hack,"A member of the Anonymous was said to take responsibility for the issues. The member used a for of cross-site request forgery, posting this: ""Cross-site Request Forgery (CSRF) is a type of attack whereby unauthorized commands are transmitted from a user that the application trusts.",http://www.streetinsider.com/Insiders+Blog/Facebook+(FB)+Said+to+Be+Having+Technical+Issues+in+Europe+Due+to+Hack/7788607.html,10/11/2012,Cross-site Request Forgery (CSRF),Insufficient Process Validation,Worm,Social,,,,,,,,,,
-2012-389,WHID 2012-389: Facebook (FB) Said to Be Having Technical Issues in Europe Due to Hack,"A member of the Anonymous was said to take responsibility for the issues. The member used a for of cross-site request forgery, posting this: ""Cross-site Request Forgery (CSRF) is a type of attack whereby unauthorized commands are transmitted from a user that the application trusts.",http://www.streetinsider.com/Insiders+Blog/Facebook+(FB)+Said+to+Be+Having+Technical+Issues+in+Europe+Due+to+Hack/7788607.html,10/11/2012,Cross-site Request Forgery (CSRF),Insufficient Process Validation,Worm,Social,,,,,,,,,,
-2012-38,WHID 2012-38: Lynas Corp website hacked,"In a show of opposition to a near-complete rare earths processing plant in Malaysia, the website of Australian miner Lynas Corporation has been hacked.",http://www.freemalaysiatoday.com/2012/02/27/lynas-corp-website-hacked/,2/26/2012,Denial of Service,Insufficient Anti-automation,Downtime,Retail,Australia,Unreported,NA,1,Malaysia,Unreported,Unreported,None,NA,
-2012-38,WHID 2012-38: Lynas Corp website hacked,"In a show of opposition to a near-complete rare earths processing plant in Malaysia, the website of Australian miner Lynas Corporation has been hacked.",http://www.freemalaysiatoday.com/2012/02/27/lynas-corp-website-hacked/,2/26/2012,Denial of Service,Insufficient Anti-automation,Downtime,Retail,Australia,Unreported,NA,1,Malaysia,Unreported,Unreported,None,NA,
-2012-390,"WHID 2012-390: Burlington city bank account hacked, $400k stolen",The city of Burlington is warning its employees to check their bank accounts after finding out funds have been stolen,http://www.komonews.com/news/local/Burlington-city-bank-account-hacked-173966921.html,10/12/2012,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,,,,,,,,,,
-2012-390,"WHID 2012-390: Burlington city bank account hacked, $400k stolen",The city of Burlington is warning its employees to check their bank accounts after finding out funds have been stolen,http://www.komonews.com/news/local/Burlington-city-bank-account-hacked-173966921.html,10/12/2012,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,,,,,,,,,,
-2012-391,"WHID 2012-391: Hackers target Fairfax holiday site Stayz, altering bank details on listings","CYBER criminals tried to swindle unsuspecting holidaymakers out of their money by altering the details of listings on Fairfax's holiday rental website, Stayz.com.au.",http://www.theaustralian.com.au/travel/news/hackers-target-fairfax-holiday-site-stayz-altering-bank-details-on-listings/story-e6frg8ro-1226496595089,10/15/2012,Stolen Credentials,Insufficient Authentication,Monetary Loss,Travel,,,,,,,,,,
-2012-391,"WHID 2012-391: Hackers target Fairfax holiday site Stayz, altering bank details on listings","CYBER criminals tried to swindle unsuspecting holidaymakers out of their money by altering the details of listings on Fairfax's holiday rental website, Stayz.com.au.",http://www.theaustralian.com.au/travel/news/hackers-target-fairfax-holiday-site-stayz-altering-bank-details-on-listings/story-e6frg8ro-1226496595089,10/15/2012,Stolen Credentials,Insufficient Authentication,Monetary Loss,Travel,,,,,,,,,,
-2012-392,WHID 2012-392: BB&T Site Outages Linked to DDoS,"BB&T Corp., a Winston-Salem, N.C.-based bank, acknowledged Oct. 17 that its website was suffering from intermittent outages related to a distributed denial of service attack. The $178.5 billion institution is the ninth U.S. bank to be affected by a DDoS strike in the last five weeks.",http://www.bankinfosecurity.com/bbt-site-outages-linked-to-ddos-a-5208,10/17/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-392,WHID 2012-392: BB&T Site Outages Linked to DDoS,"BB&T Corp., a Winston-Salem, N.C.-based bank, acknowledged Oct. 17 that its website was suffering from intermittent outages related to a distributed denial of service attack. The $178.5 billion institution is the ninth U.S. bank to be affected by a DDoS strike in the last five weeks.",http://www.bankinfosecurity.com/bbt-site-outages-linked-to-ddos-a-5208,10/17/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-393,"WHID 2012-393: HSBC websites fell in DDoS attack last night, bank admits",HSBC has blamed a denial of service attack for the downtime of many of its websites worldwide on Thursday night.,http://www.theregister.co.uk/2012/10/19/hsbc_ddos/,10/19/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-393,"WHID 2012-393: HSBC websites fell in DDoS attack last night, bank admits",HSBC has blamed a denial of service attack for the downtime of many of its websites worldwide on Thursday night.,http://www.theregister.co.uk/2012/10/19/hsbc_ddos/,10/19/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-394,WHID 2012-394: 'Major interruption' at GitHub as attackers launch DDoS,GitHub has been targeted by another DDoS attack that has been successful in causing major disruptions for the code sharing site.,http://www.zdnet.com/major-interruption-at-github-as-attackers-launch-ddos-7000006030/,10/19/2012,Denial of Service,Insufficient Anti-automation,Downtime,Technology,,,,,,,,,,
-2012-394,WHID 2012-394: 'Major interruption' at GitHub as attackers launch DDoS,GitHub has been targeted by another DDoS attack that has been successful in causing major disruptions for the code sharing site.,http://www.zdnet.com/major-interruption-at-github-as-attackers-launch-ddos-7000006030/,10/19/2012,Denial of Service,Insufficient Anti-automation,Downtime,Technology,,,,,,,,,,
-2012-395,WHID 2012-395: National Weather Service website hacked,"Hackers have breached servers belonging to the US National Weather Service by exploiting a vulnerability in the weather.gov website, releasing sensitive data from the government systems.",http://nakedsecurity.sophos.com/2012/10/19/national-weather-service-website-hacked-by-kosovo-hackers-security/,10/19/2012,Local File Inclusion (LFI),Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2012-395,WHID 2012-395: National Weather Service website hacked,"Hackers have breached servers belonging to the US National Weather Service by exploiting a vulnerability in the weather.gov website, releasing sensitive data from the government systems.",http://nakedsecurity.sophos.com/2012/10/19/national-weather-service-website-hacked-by-kosovo-hackers-security/,10/19/2012,Local File Inclusion (LFI),Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2012-396,WHID 2012-396: Ally Financial Latest U.S Bank to Face Cyber Attacks,Ally Financial Inc on Thursday became the latest U.S. financial institution to face cyber attacks that may stem from hackers in Iran.,http://www.banktech.com/risk-management/ally-financial-latest-us-bank-to-face-cy/240009394,10/18/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-396,WHID 2012-396: Ally Financial Latest U.S Bank to Face Cyber Attacks,Ally Financial Inc on Thursday became the latest U.S. financial institution to face cyber attacks that may stem from hackers in Iran.,http://www.banktech.com/risk-management/ally-financial-latest-us-bank-to-face-cy/240009394,10/18/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2012-397,"WHID 2012-397: Hacker swipes 3.6M Social Security numbers, other data","By the time the computer crimes office of the U.S. Secret Service discovered a problem Oct. 10, a foreign hacker had taken a database from the Department of Revenue's computers exposing 3.6 million Social Security numbers and 387,000 credit and debit card numbers, one of the largest computer breaches in the state or nation.",http://www.usatoday.com/story/news/nation/2012/10/26/hacker-south-caroling-social-security-numbers/1660929/,10/26/2012,Stolen Credentials,Insufficient Authentication,Leakage of Information,Government,,,,,,,,,,
-2012-397,"WHID 2012-397: Hacker swipes 3.6M Social Security numbers, other data","By the time the computer crimes office of the U.S. Secret Service discovered a problem Oct. 10, a foreign hacker had taken a database from the Department of Revenue's computers exposing 3.6 million Social Security numbers and 387,000 credit and debit card numbers, one of the largest computer breaches in the state or nation.",http://www.usatoday.com/story/news/nation/2012/10/26/hacker-south-caroling-social-security-numbers/1660929/,10/26/2012,Stolen Credentials,Insufficient Authentication,Leakage of Information,Government,,,,,,,,,,
-2012-398,"WHID 2012-398: Ford Website Hacked by NullCrew, User Credentials Leaked Online","The hackers claim to have leveraged an SQL Injection vulnerability in order to gain access to the databases behind the social.ford.com subdomain. As a result of the breach, database and table names, customer usernames ??? represented by email addresses ??? and encrypted passwords have been leaked.",http://news.softpedia.com/news/Ford-Website-Hacked-by-NullCrew-User-Credentials-Leaked-Online-302688.shtml,10/29/2012,SQL Injection,Improper Input Handling,Leakage of Information,Automotive,,,,,,,,,,
-2012-398,"WHID 2012-398: Ford Website Hacked by NullCrew, User Credentials Leaked Online","The hackers claim to have leveraged an SQL Injection vulnerability in order to gain access to the databases behind the social.ford.com subdomain. As a result of the breach, database and table names, customer usernames ??? represented by email addresses ??? and encrypted passwords have been leaked.",http://news.softpedia.com/news/Ford-Website-Hacked-by-NullCrew-User-Credentials-Leaked-Online-302688.shtml,10/29/2012,SQL Injection,Improper Input Handling,Leakage of Information,Automotive,,,,,,,,,,
-2012-399,"WHID 2012-399: French Euromillions Lottery Website Hacked, Anti-Gambling Message Posted",Hackers from the Moroccan Ghosts collective have breached and defaced the website of France???s renowned Euromillions lottery (euromillions.fr).,http://news.softpedia.com/news/French-Euromillions-Lottery-Website-Hacked-Anti-Gambling-Message-Posted-302742.shtml,10/29/2012,Unknown,Unknown,Defacement,Gaming,,,,,,,,,,
-2012-399,"WHID 2012-399: French Euromillions Lottery Website Hacked, Anti-Gambling Message Posted",Hackers from the Moroccan Ghosts collective have breached and defaced the website of France???s renowned Euromillions lottery (euromillions.fr).,http://news.softpedia.com/news/French-Euromillions-Lottery-Website-Hacked-Anti-Gambling-Message-Posted-302742.shtml,10/29/2012,Unknown,Unknown,Defacement,Gaming,,,,,,,,,,
-2012-39,WHID 2012-39: Roland's 'Backstage' website hacked,"Roland Corporation's United States arm has confirmed that its Backstage website has been hacked, exposing the personal data of customers.","http://www.itnews.com.au/News/291778,rolands-backstage-website-hacked.aspx",2/27/2012,Unknown,Unknown,Leakage of Information,Music,United States,Unreported,NA,1,Unreported,Unreported,Unreported,"user name, e-mail address, password, street address, phone number, and/or personal information such as age range, gender and registered products",< 1 % of total information,
-2012-39,WHID 2012-39: Roland's 'Backstage' website hacked,"Roland Corporation's United States arm has confirmed that its Backstage website has been hacked, exposing the personal data of customers.","http://www.itnews.com.au/News/291778,rolands-backstage-website-hacked.aspx",2/27/2012,Unknown,Unknown,Leakage of Information,Music,United States,Unreported,NA,1,Unreported,Unreported,Unreported,"user name, e-mail address, password, street address, phone number, and/or personal information such as age range, gender and registered products",< 1 % of total information,
-2012-3,WHID 2012-3: Pastebin on the mend after DDoS battering,Popular text file sharing service Pastebin.com has returned online following a denial of service attack on Tuesday.,http://www.theregister.co.uk/2012/01/04/pastebin_ddos_recovery/,1/3/2012,Denial of Service,Insufficient Anti-automation,Downtime,Information,"Los Angeles, CA",Unknown,N/A,1,Unknown,File Sharing,,,,
-2012-400,WHID 2012-400: Hackers Replace NBC Sites With Sm??rg??sbord of Hacker Cliches,"hose in search of SNL and 30 Rock clips over at NBC???s videos page have been met with something quite different: a hacked page of weirdness with a surprisingly catchy soundtrack. It???s most prominent website hack we???ve seen in a while, and also one of the least coherent.",http://www.gizmodo.co.uk/2012/11/hackers-replace-nbc-sites-with-smorgasbord-of-hacker-cliches/,11/4/2012,Unknown,Unknown,Defacement,Media,,,,,,,,,,
-2012-400,WHID 2012-400: Hackers Replace NBC Sites With Sm??rg??sbord of Hacker Cliches,"hose in search of SNL and 30 Rock clips over at NBC???s videos page have been met with something quite different: a hacked page of weirdness with a surprisingly catchy soundtrack. It???s most prominent website hack we???ve seen in a while, and also one of the least coherent.",http://www.gizmodo.co.uk/2012/11/hackers-replace-nbc-sites-with-smorgasbord-of-hacker-cliches/,11/4/2012,Unknown,Unknown,Defacement,Media,,,,,,,,,,
-2012-401,"WHID 2012-401: Hackers claim attacks against ImageShack, Symantec, PayPal, other websites","Different hacker groups claim to have breached servers belonging to ImageShack, Symantec, PayPal and other organizations.",http://www.computerworld.com/s/article/9233262/Hackers_claim_attacks_against_ImageShack_Symantec_PayPal_other_websites?taxonomyId=142,11/5/2012,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,,,,,,,,,
-2012-401,"WHID 2012-401: Hackers claim attacks against ImageShack, Symantec, PayPal, other websites","Different hacker groups claim to have breached servers belonging to ImageShack, Symantec, PayPal and other organizations.",http://www.computerworld.com/s/article/9233262/Hackers_claim_attacks_against_ImageShack_Symantec_PayPal_other_websites?taxonomyId=142,11/5/2012,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,,,,,,,,,
-2012-402,WHID 2012-402: NullCrew hacks MoD ??? leaks thousands of plaintext credentials,"NullCrew remembered the 5th of November by breaking into mod.co.uk and stealing and dumping more than 3400 email addresses and passwords. While the date of the breach cannot be verified, it does look as if it happened on the Guy Fawkes anniversary",http://www.infosecurity-magazine.com/view/29161/nullcrew-hacks-mod-leaks-thousands-of-plaintext-credentials/,11/6/2012,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2012-402,WHID 2012-402: NullCrew hacks MoD ??? leaks thousands of plaintext credentials,"NullCrew remembered the 5th of November by breaking into mod.co.uk and stealing and dumping more than 3400 email addresses and passwords. While the date of the breach cannot be verified, it does look as if it happened on the Guy Fawkes anniversary",http://www.infosecurity-magazine.com/view/29161/nullcrew-hacks-mod-leaks-thousands-of-plaintext-credentials/,11/6/2012,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2012-403,"WHID 2012-403: Pizza Hut hacked, customer info lost, credit card details safe","The company denies that 240,000 customer credit card details were stolen, but hackers did gain access to customer information.",http://www.zdnet.com/au/pizza-hut-hacked-customer-info-lost-credit-card-details-safe-7000007016/,11/7/2012,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2012-403,"WHID 2012-403: Pizza Hut hacked, customer info lost, credit card details safe","The company denies that 240,000 customer credit card details were stolen, but hackers did gain access to customer information.",http://www.zdnet.com/au/pizza-hut-hacked-customer-info-lost-credit-card-details-safe-7000007016/,11/7/2012,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2012-404,WHID 2012-404: NullCrew Hackers Hit UNESCO Web Site,The hackers defaced the page with a statement calling the United Nations 'just a bunch of corrupt nations.',http://www.esecurityplanet.com/hackers/nullcrew-hackers-hit-unesco-web-site.html,11/8/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-404,WHID 2012-404: NullCrew Hackers Hit UNESCO Web Site,The hackers defaced the page with a statement calling the United Nations 'just a bunch of corrupt nations.',http://www.esecurityplanet.com/hackers/nullcrew-hackers-hit-unesco-web-site.html,11/8/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-405,WHID 2012-405: Hackers add hidden pages to government sites,"Hackers gained access to several government websites Tuesday, November 13, but not in any way average users would notice.",http://www.rappler.com/life-and-style/technology/16053-hackers-add-hidden-pages-to-government-sites,11/13/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-405,WHID 2012-405: Hackers add hidden pages to government sites,"Hackers gained access to several government websites Tuesday, November 13, but not in any way average users would notice.",http://www.rappler.com/life-and-style/technology/16053-hackers-add-hidden-pages-to-government-sites,11/13/2012,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2012-406,WHID 2012-406: Hacker Darwinare Claims Breach of Amazon UK,"The hacker published more than 600 users' details online, including some passwords in clear text.",http://www.esecurityplanet.com/hackers/hacker-darwinare-claims-breach-of-amazon-uk.html,11/12/2012,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2012-406,WHID 2012-406: Hacker Darwinare Claims Breach of Amazon UK,"The hacker published more than 600 users' details online, including some passwords in clear text.",http://www.esecurityplanet.com/hackers/hacker-darwinare-claims-breach-of-amazon-uk.html,11/12/2012,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2012-407,"WHID 2012-407: DDoS Takes Down The Pirate Bay, isoHunt and Others","The Pirate Bay is suffering some downtime this morning due to a DDoS attack that appears to originate from a Twitter user who goes by the handle Zeiko Anonymous. The connection flood targeted at the site originates from a small botnet and isn???t worrying The Pirate Bay team too much. Instead, the BitTorrent site is taking this opportunity to do some database maintenance.",http://torrentfreak.com/ddos-takes-down-the-pirate-bay-121113/,11/13/2012,Denial of Service,Insufficient Anti-automation,Downtime,Torrent Site,,,,,,,,,,
-2012-407,"WHID 2012-407: DDoS Takes Down The Pirate Bay, isoHunt and Others","The Pirate Bay is suffering some downtime this morning due to a DDoS attack that appears to originate from a Twitter user who goes by the handle Zeiko Anonymous. The connection flood targeted at the site originates from a small botnet and isn???t worrying The Pirate Bay team too much. Instead, the BitTorrent site is taking this opportunity to do some database maintenance.",http://torrentfreak.com/ddos-takes-down-the-pirate-bay-121113/,11/13/2012,Denial of Service,Insufficient Anti-automation,Downtime,Torrent Site,,,,,,,,,,
-2012-408,"WHID 2012-408: Adobe Servers Compromised, 150,000 Records Leaked","Adobe is the latest to have their databases compromised as an Egyptian hacker has posted links to records of employees from Adobe as well as NASA and the US Military. The hacker, who goes by the name ???Hima,??? said he had hacked into Adobe???s server to gather these records before posting them on Pastebin. All told, Hima claims to have obtained the records for 150,000 Adobe clients and employees redOrbit (http://s.tt/1tAg4)",http://www.redorbit.com/news/technology/1112732564/adobe-user-records-hacked-hima-111512/,11/15/2012,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,,,,,,,,,
-2012-408,"WHID 2012-408: Adobe Servers Compromised, 150,000 Records Leaked","Adobe is the latest to have their databases compromised as an Egyptian hacker has posted links to records of employees from Adobe as well as NASA and the US Military. The hacker, who goes by the name ???Hima,??? said he had hacked into Adobe???s server to gather these records before posting them on Pastebin. All told, Hima claims to have obtained the records for 150,000 Adobe clients and employees redOrbit (http://s.tt/1tAg4)",http://www.redorbit.com/news/technology/1112732564/adobe-user-records-hacked-hima-111512/,11/15/2012,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,,,,,,,,,
-2012-409,WHID 2012-409: New Zealand Herald falls victim to XSS prank,The hack caused the site's text to be reversed and photos and graphics to rotate clockwise,http://www.csoonline.com/article/721785/new-zealand-herald-falls-victim-to-xss-prank,11/15/2012,Cross-site Scripting (XSS),Improper Output Handling,Defacement,Media,,,,,,,,,,
-2012-409,WHID 2012-409: New Zealand Herald falls victim to XSS prank,The hack caused the site's text to be reversed and photos and graphics to rotate clockwise,http://www.csoonline.com/article/721785/new-zealand-herald-falls-victim-to-xss-prank,11/15/2012,Cross-site Scripting (XSS),Improper Output Handling,Defacement,Media,,,,,,,,,,
-2012-40,WHID 2012-40: Interpol website hacked after arrest of 25 suspected Anonymous members,Interpol's website appears to have been the target of a cyber attack following the arrests of 25 members of the hacking activist group Anonymous.,http://www.thejournal.ie/interpol-website-hacked-after-arrest-of-25-suspected-anonymous-members-369043-Feb2012/,2/28/2012,Denial of Service,Insufficient Anti-automation,Downtime,Law Enforcement,Global,Yes,Denial of Service,1,Unreported,Unreported,Unreported,None,NA,
-2012-40,WHID 2012-40: Interpol website hacked after arrest of 25 suspected Anonymous members,Interpol's website appears to have been the target of a cyber attack following the arrests of 25 members of the hacking activist group Anonymous.,http://www.thejournal.ie/interpol-website-hacked-after-arrest-of-25-suspected-anonymous-members-369043-Feb2012/,2/28/2012,Denial of Service,Insufficient Anti-automation,Downtime,Law Enforcement,Global,Yes,Denial of Service,1,Unreported,Unreported,Unreported,None,NA,
-2012-410,"WHID 2012-410: Anonymous takes on Israeli websites, wipes Jerusalem bank",Hacking collective Anonymous has gone on a hacking spree in protest over attacks on Gaza.,http://www.zdnet.com/anonymous-takes-on-israeli-websites-wipes-jerusalem-bank-7000007537/,11/16/2012,Unknown,Unknown,Defacement,Finance,,,,,,,,,,
-2012-410,"WHID 2012-410: Anonymous takes on Israeli websites, wipes Jerusalem bank",Hacking collective Anonymous has gone on a hacking spree in protest over attacks on Gaza.,http://www.zdnet.com/anonymous-takes-on-israeli-websites-wipes-jerusalem-bank-7000007537/,11/16/2012,Unknown,Unknown,Defacement,Finance,,,,,,,,,,
-2012-411,WHID 2012-411: Active XSS flaw discovered on eBay,"According to XSSed, Shubham Upadhyay has discovered an active XSS flaw affecting Ebay.com.",http://www.zdnet.com/active-xss-flaw-discovered-on-ebay-7000007539/,11/16/2012,Cross-site Scripting (XSS),Improper Output Handling,Session Hijacking,Retail,,,,,,,,,,
-2012-411,WHID 2012-411: Active XSS flaw discovered on eBay,"According to XSSed, Shubham Upadhyay has discovered an active XSS flaw affecting Ebay.com.",http://www.zdnet.com/active-xss-flaw-discovered-on-ebay-7000007539/,11/16/2012,Cross-site Scripting (XSS),Improper Output Handling,Session Hijacking,Retail,,,,,,,,,,
-2012-412,"WHID 2012-412: Almost 30,000 Georgia Nationwide Insurance Customers Hacked",Insurance Commissioner Ralph Hudgens issued the following statement today concerning the unauthorized access of Nationwide Insurance???s website,http://www.wctv.tv/home/headlines/Almost-30000-Georgia-Nationwide-Insurance-Customers-Hacked-180076711.html,11/20/2012,Unknown,Unknown,Leakage of Information,Government,,,,,,,,,,
-2012-412,"WHID 2012-412: Almost 30,000 Georgia Nationwide Insurance Customers Hacked",Insurance Commissioner Ralph Hudgens issued the following statement today concerning the unauthorized access of Nationwide Insurance???s website,http://www.wctv.tv/home/headlines/Almost-30000-Georgia-Nationwide-Insurance-Customers-Hacked-180076711.html,11/20/2012,Unknown,Unknown,Leakage of Information,Government,,,,,,,,,,
-2012-413,WHID 2012-413: Exploitable SQLi on Ebay.com,During some hunting on Ebay???s subdomains I found an exploitable SQL injection which I reported to Ebay???s security team. It took 20 days until they finally fixed the exploitable SQL injection.,http://blog.majorsecurity.net/2012/11/18/exploitable-sqli-on-ebay-dot-com-analysis/,11/18/2012,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2012-413,WHID 2012-413: Exploitable SQLi on Ebay.com,During some hunting on Ebay???s subdomains I found an exploitable SQL injection which I reported to Ebay???s security team. It took 20 days until they finally fixed the exploitable SQL injection.,http://blog.majorsecurity.net/2012/11/18/exploitable-sqli-on-ebay-dot-com-analysis/,11/18/2012,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2012-414,WHID 2012-414: Website hacked changing online prices to 1p,Hackers tried to steal thousands of pounds of goods from two Lancashire business. The two businesses discovered hackers had changed the online value of their goods to 1p before trying to buy the items ??? which included ??2000 of furniture - with a stolen credit card,http://www.itv.com/news/granada/update/2012-11-21/website-hacked-changing-online-prices-to-1p/,11/21/2012,Unknown,Unknown,Monetary Loss,Retail,United Kingdom,,,,,,,,,
-2012-414,WHID 2012-414: Website hacked changing online prices to 1p,Hackers tried to steal thousands of pounds of goods from two Lancashire business. The two businesses discovered hackers had changed the online value of their goods to 1p before trying to buy the items ??? which included ??2000 of furniture - with a stolen credit card,http://www.itv.com/news/granada/update/2012-11-21/website-hacked-changing-online-prices-to-1p/,11/21/2012,Unknown,Unknown,Monetary Loss,Retail,United Kingdom,,,,,,,,,
-2012-415,"WHID 2012-415: Top Israeli Official???s Facebook, Twitter Accounts Hacked",A group of pro-Palestinian hackers apparently managed to break into the social networking accounts of Israeli Deputy Prime Minister Silvan Shalom and has promised to release a drove of the top official???s private emails.,http://abcnews.go.com/blogs/headlines/2012/11/top-israeli-officials-facebook-twitter-accounts-hacked/,11/21/2012,Unknown,Unknown,Disinformation,Social,,,,,,,,,,
-2012-415,"WHID 2012-415: Top Israeli Official???s Facebook, Twitter Accounts Hacked",A group of pro-Palestinian hackers apparently managed to break into the social networking accounts of Israeli Deputy Prime Minister Silvan Shalom and has promised to release a drove of the top official???s private emails.,http://abcnews.go.com/blogs/headlines/2012/11/top-israeli-officials-facebook-twitter-accounts-hacked/,11/21/2012,Unknown,Unknown,Disinformation,Social,,,,,,,,,,
-2012-416,WHID 2012-416: Hacked Go Daddy sites infecting users with ransomware,Users are getting infected with ransomware thanks to criminals managing to hack the DNS records of Go Daddy hosted websites.,http://nakedsecurity.sophos.com/2012/11/23/hacked-go-daddy-ransomware/,11/23/2012,DNS Hijacking,Insufficient Process Validation,Planting of Malware,Hosting Providers,,,,,,,,,,
-2012-416,WHID 2012-416: Hacked Go Daddy sites infecting users with ransomware,Users are getting infected with ransomware thanks to criminals managing to hack the DNS records of Go Daddy hosted websites.,http://nakedsecurity.sophos.com/2012/11/23/hacked-go-daddy-ransomware/,11/23/2012,DNS Hijacking,Insufficient Process Validation,Planting of Malware,Hosting Providers,,,,,,,,,,
-2012-417,WHID 2012-417: Yahoo Email-Stealing Exploit Fetches $700,"A zero-day vulnerability in yahoo.com that lets attackers hijack Yahoo! email accounts and redirect users to malicious Web sites offers a fascinating glimpse into the underground market for large-scale exploits. The exploit, being sold for $700 by an Egyptian hacker on an exclusive cybercrime forum, targets a ???cross-site scripting??? (XSS) weakness in yahoo.com that lets attackers steal cookies from Yahoo! Webmail users.",http://krebsonsecurity.com/2012/11/yahoo-email-stealing-exploit-fetches-700/,11/23/2012,Cross-site Scripting (XSS),Improper Output Handling,Session Hijacking,Hosting Providers,,,,,,,,,,
-2012-417,WHID 2012-417: Yahoo Email-Stealing Exploit Fetches $700,"A zero-day vulnerability in yahoo.com that lets attackers hijack Yahoo! email accounts and redirect users to malicious Web sites offers a fascinating glimpse into the underground market for large-scale exploits. The exploit, being sold for $700 by an Egyptian hacker on an exclusive cybercrime forum, targets a ???cross-site scripting??? (XSS) weakness in yahoo.com that lets attackers steal cookies from Yahoo! Webmail users.",http://krebsonsecurity.com/2012/11/yahoo-email-stealing-exploit-fetches-700/,11/23/2012,Cross-site Scripting (XSS),Improper Output Handling,Session Hijacking,Hosting Providers,,,,,,,,,,
-2012-418,WHID 2012-418: Google Pakistan website hacked,"The Google Pakistan homepage has been apparently hacked by Turkish hackers. If you go to google.com.pk, you will find a black page with something written in Turkish.",http://ibnlive.in.com/news/google-pakistan-website-hacked/307189-11.html,11/24/2012,Unknown,Unknown,Defacement,Search Engine,,,,,,,,,,
-2012-418,WHID 2012-418: Google Pakistan website hacked,"The Google Pakistan homepage has been apparently hacked by Turkish hackers. If you go to google.com.pk, you will find a black page with something written in Turkish.",http://ibnlive.in.com/news/google-pakistan-website-hacked/307189-11.html,11/24/2012,Unknown,Unknown,Defacement,Search Engine,,,,,,,,,,
-2012-419,"WHID 2012-419: Las Vegas Sun, sister websites recover from disruptive cyberattack","Four Greenspun Media Group websites -- lasvegassun.com, lasvegasweekly.com, vegasinc.com and vegasdeluxe.com -- were temporarily disabled or compromised for several hours Friday night into Saturday morning, the results of a cyberattack that effectively overwhelmed servers that maintain the online media sites.",http://www.lasvegassun.com/news/2012/nov/24/attack-disrupts-las-vegas-sun-website-work-under-w/,11/24/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,,,,,,,,,,
-2012-419,"WHID 2012-419: Las Vegas Sun, sister websites recover from disruptive cyberattack","Four Greenspun Media Group websites -- lasvegassun.com, lasvegasweekly.com, vegasinc.com and vegasdeluxe.com -- were temporarily disabled or compromised for several hours Friday night into Saturday morning, the results of a cyberattack that effectively overwhelmed servers that maintain the online media sites.",http://www.lasvegassun.com/news/2012/nov/24/attack-disrupts-las-vegas-sun-website-work-under-w/,11/24/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,,,,,,,,,,
-2012-41,"WHID 2012-41: Anonymous Hackers Attack Christian Websites, Declare 'Religion Sucks LOL'","Calling it a ""sickness to this world,"" members of the formless 'hacktivist' group of computer programmers known as Anonymous declared war on religion on Friday, March 2, hacking the websites of three Christian organizations all based in and around Charlotte, North Carolina.",http://www.ibtimes.com/articles/308264/20120302/anonymous-hackers-religion-website-proxy-twitter.htm,3/2/2012,Unknown,Unknown,Downtime,Religious,"Charlotte, North Carolina",Unreported,NA,3,Unreported,Unreported,Unreported,Unreported,NA,
-2012-41,"WHID 2012-41: Anonymous Hackers Attack Christian Websites, Declare 'Religion Sucks LOL'","Calling it a ""sickness to this world,"" members of the formless 'hacktivist' group of computer programmers known as Anonymous declared war on religion on Friday, March 2, hacking the websites of three Christian organizations all based in and around Charlotte, North Carolina.",http://www.ibtimes.com/articles/308264/20120302/anonymous-hackers-religion-website-proxy-twitter.htm,3/2/2012,Unknown,Unknown,Downtime,Religious,"Charlotte, North Carolina",Unreported,NA,3,Unreported,Unreported,Unreported,Unreported,NA,
-2012-420,WHID 2012-420: Bank told to pay 42 thousand to man whose account was hacked,"Protecting the rights of those who use internet banking, a state commission upheld a district forum order and directed a bank to compensate a Navi Mumbai doctor Rs 42,000 after his account was hacked and the money withdrawn.",http://articles.timesofindia.indiatimes.com/2012-11-25/mumbai/35347098_1_bank-account-holder-rbi-guidelines,11/25/2012,Stolen Credentials,Insufficient Authentication,Monetary Loss,Finance,,,,,,,,,,
-2012-420,WHID 2012-420: Bank told to pay 42 thousand to man whose account was hacked,"Protecting the rights of those who use internet banking, a state commission upheld a district forum order and directed a bank to compensate a Navi Mumbai doctor Rs 42,000 after his account was hacked and the money withdrawn.",http://articles.timesofindia.indiatimes.com/2012-11-25/mumbai/35347098_1_bank-account-holder-rbi-guidelines,11/25/2012,Stolen Credentials,Insufficient Authentication,Monetary Loss,Finance,,,,,,,,,,
-2012-421,WHID 2012-421: Google And Apple Sites Downed In Massive Pakistani DNS Hack,"Hackers in Pakistan have reportedly hacked the organisation managing domain name servers to redirect users to their own site, disrupting access to major services such as Gmail and eBay.",http://www.techweekeurope.co.uk/news/google-apple-dns-hack-defacement-100248,11/26/2012,DNS Hijacking,Insufficient Process Validation,Defacement,Search Engine,,,,,,,,,,
-2012-421,WHID 2012-421: Google And Apple Sites Downed In Massive Pakistani DNS Hack,"Hackers in Pakistan have reportedly hacked the organisation managing domain name servers to redirect users to their own site, disrupting access to major services such as Gmail and eBay.",http://www.techweekeurope.co.uk/news/google-apple-dns-hack-defacement-100248,11/26/2012,DNS Hijacking,Insufficient Process Validation,Defacement,Search Engine,,,,,,,,,,
-2012-422,WHID 2012-422: Hackers steal $150K from Wis. school district,"A school district in western Wisconsin says hackers have stolen nearly $150,000 after breaking into its payroll system.",http://www.kare11.com/news/article/999866/396/Hackers-steal-150K-from-Wis-school-district,11/28/2012,Stolen Credentials,Insufficient Authentication,Monetary Loss,Finance,,,,,,,,,,
-2012-422,WHID 2012-422: Hackers steal $150K from Wis. school district,"A school district in western Wisconsin says hackers have stolen nearly $150,000 after breaking into its payroll system.",http://www.kare11.com/news/article/999866/396/Hackers-steal-150K-from-Wis-school-district,11/28/2012,Stolen Credentials,Insufficient Authentication,Monetary Loss,Finance,,,,,,,,,,
-2012-423,WHID 2012-423: Hackers planted backdoor in Piwik's web analytics update,Widely-used open source web analytics platform Piwik has confirmed that hackers on Monday breached its piwik.org webserver and planted malicious code in the ZIP file containing its current software update.,http://www.cso.com.au/article/443069/hackers_planted_backdoor_piwik_web_analytics_update/,11/28/2012,Unknown,Unknown,Planting of Malware,Technology,,,,,,WordPress,,,,
-2012-423,WHID 2012-423: Hackers planted backdoor in Piwik's web analytics update,Widely-used open source web analytics platform Piwik has confirmed that hackers on Monday breached its piwik.org webserver and planted malicious code in the ZIP file containing its current software update.,http://www.cso.com.au/article/443069/hackers_planted_backdoor_piwik_web_analytics_update/,11/28/2012,Unknown,Unknown,Planting of Malware,Technology,,,,,,WordPress,,,,
-2012-424,WHID 2012-424: How a computer worm slithered across a huge number of Tumblr accounts,"A quickly spreading worm on Tumblr has caused media companies The Verge, Reuters, and a large number of other account holders to publish a post laced with racist epithets and other offensive content.",http://arstechnica.com/security/2012/12/how-a-computer-worm-slithered-across-a-huge-number-of-tumblr-accounts/,12/3/2012,Cross-site Request Forgery (CSRF),Insufficient Process Validation,Worm,Social,,,,,,,,,,
-2012-424,WHID 2012-424: How a computer worm slithered across a huge number of Tumblr accounts,"A quickly spreading worm on Tumblr has caused media companies The Verge, Reuters, and a large number of other account holders to publish a post laced with racist epithets and other offensive content.",http://arstechnica.com/security/2012/12/how-a-computer-worm-slithered-across-a-huge-number-of-tumblr-accounts/,12/3/2012,Cross-site Request Forgery (CSRF),Insufficient Process Validation,Worm,Social,,,,,,,,,,
-2012-425,WHID 2012-425: Anonymous Hackers Target Australian Right-Wing Party,Anonymous hackers recently defaced the South Australian Web site for Australia's far-right Family First Party.,http://www.esecurityplanet.com/hackers/anonymous-hackers-target-australian-right-wing-party.html,12/4/2012,Unknown,Unknown,Defacement,Politics,Australia,No,NA,1,Unknown,PHP,Unknown,None,NA,
-2012-425,WHID 2012-425: Anonymous Hackers Target Australian Right-Wing Party,Anonymous hackers recently defaced the South Australian Web site for Australia's far-right Family First Party.,http://www.esecurityplanet.com/hackers/anonymous-hackers-target-australian-right-wing-party.html,12/4/2012,Unknown,Unknown,Defacement,Politics,Australia,No,NA,1,Unknown,PHP,Unknown,None,NA,
-2012-426,WHID 2012-426: ITU Website Hacked,The websites of the ITU were hit by a denial of service attack.,http://www.multichannel.com/technology/itu-website-hacked/140572,12/5/2012,Denial of Service,Unknown,Service disruption,Information Technology,"Geneva, Switzerland",Unknown,NA,1,Unknown,Microsoft Sharepoint,Unknown,None,NA,
-2012-426,WHID 2012-426: ITU Website Hacked,The websites of the ITU were hit by a denial of service attack.,http://www.multichannel.com/technology/itu-website-hacked/140572,12/5/2012,Denial of Service,Unknown,Service disruption,Information Technology,"Geneva, Switzerland",Unknown,NA,1,Unknown,Microsoft Sharepoint,Unknown,None,NA,
-2012-427,WHID 2012-427: Who Hacked the Dalai Lama's Website?,A website associated with the Dalai Lama's YouTube account has been hacked using malware.,http://mashable.com/2012/12/06/dalai-lama-website-hacked/,12/3/2012,Unknown,Unknown,Malware distribution,Religion,India,Unknown,NA,1,Unknown,PHP,Unknown,None,NA,
-2012-427,WHID 2012-427: Who Hacked the Dalai Lama's Website?,A website associated with the Dalai Lama's YouTube account has been hacked using malware.,http://mashable.com/2012/12/06/dalai-lama-website-hacked/,12/3/2012,Unknown,Unknown,Malware distribution,Religion,India,Unknown,NA,1,Unknown,PHP,Unknown,None,NA,
-2012-428,WHID 2012-427: Iranians hacked Navy network for four months,"Iranian hackers attacked NMCI in August of 2012, using a vulnerability in a public-facing website to gain initial access to the network.",http://arstechnica.com/information-technology/2014/02/iranians-hacked-navy-network-for-4-months-not-a-surprise/,8/19/2012,Unknown,Unknown,Downtime,Government,,,,,,,,,,
-2012-428,WHID 2012-427: Iranians hacked Navy network for four months,"Iranian hackers attacked NMCI in August of 2012, using a vulnerability in a public-facing website to gain initial access to the network.",http://arstechnica.com/information-technology/2014/02/iranians-hacked-navy-network-for-4-months-not-a-surprise/,8/19/2012,Unknown,Unknown,Downtime,Government,,,,,,,,,,
-2012-42,WHID 2012-42: Vatican Website Hacked,"Computers weren't working right at the Vatican on Wednesday. The loosely-affiliated international group of hackers known as Anonymous claimed it shut down the Catholic Church's official website, vatican.va.",http://kdrv.com/news/local/240926,3/7/2012,Denial of Service,Insufficient Anti-automation,Downtime,Religious,"Vatican City, Italy",Yes,Denial of Service,1,Unreported,Unreported,Unreported,None,NA,
-2012-42,WHID 2012-42: Vatican Website Hacked,"Computers weren't working right at the Vatican on Wednesday. The loosely-affiliated international group of hackers known as Anonymous claimed it shut down the Catholic Church's official website, vatican.va.",http://kdrv.com/news/local/240926,3/7/2012,Denial of Service,Insufficient Anti-automation,Downtime,Religious,"Vatican City, Italy",Yes,Denial of Service,1,Unreported,Unreported,Unreported,None,NA,
-2012-43,WHID 2012-43: Lebanon Labor Ministry website hacked,"The website of the Labor Ministry was hacked Thursday by a group calling itself ""Mad Hackerz Team.???",http://www.dailystar.com.lb/News/Politics/2012/Mar-08/165981-labor-ministry-website-hacked.ashx#axzz1oah4DHvr,3/8/2012,Unknown,Unknown,Defacement,Government,Lebanon,Non,NA,1,Unreported,Unreported,Unreported,None,NA,
-2012-43,WHID 2012-43: Lebanon Labor Ministry website hacked,"The website of the Labor Ministry was hacked Thursday by a group calling itself ""Mad Hackerz Team.???",http://www.dailystar.com.lb/News/Politics/2012/Mar-08/165981-labor-ministry-website-hacked.ashx#axzz1oah4DHvr,3/8/2012,Unknown,Unknown,Defacement,Government,Lebanon,Non,NA,1,Unreported,Unreported,Unreported,None,NA,
-2012-44,WHID 2012-44: Anonymous Hackers Take Down PandaLabs Website,Hackers with the collective Anonymous attack the home page of Panda Security's PandaLabs in apparent retaliation for the arrests of five LulzSec members.,http://www.eweek.com/c/a/Security/Anonymous-Hackers-Take-Down-PandaLabs-Website-687825/,3/7/2012,Unknown,Unknown,Defacement,Technology,USA,Unreported,NA,1,Unreported,Unreported,Unreported,None,NA,
-2012-44,WHID 2012-44: Anonymous Hackers Take Down PandaLabs Website,Hackers with the collective Anonymous attack the home page of Panda Security's PandaLabs in apparent retaliation for the arrests of five LulzSec members.,http://www.eweek.com/c/a/Security/Anonymous-Hackers-Take-Down-PandaLabs-Website-687825/,3/7/2012,Unknown,Unknown,Defacement,Technology,USA,Unreported,NA,1,Unreported,Unreported,Unreported,None,NA,
-2012-45,"WHID 2012-45: Hackers hit Australian police website, leak data","Hackers breached an Australian police website this week, defacing the site and leaking the online data of its members.",http://www.gmanetwork.com/news/story/252173/scitech/technology/hackers-hit-australian-police-website-leak-data,3/21/2012,Unknown,Unknown,Defacement,Law Enforcement,Australia,No,NA,1,Unreported,Unreported,Unreported,User information,Unreported,
-2012-45,"WHID 2012-45: Hackers hit Australian police website, leak data","Hackers breached an Australian police website this week, defacing the site and leaking the online data of its members.",http://www.gmanetwork.com/news/story/252173/scitech/technology/hackers-hit-australian-police-website-leak-data,3/21/2012,Unknown,Unknown,Defacement,Law Enforcement,Australia,No,NA,1,Unreported,Unreported,Unreported,User information,Unreported,
-2012-46,WHID 2012-46: Orchard Central's website gets hacked,"Orchard Central's website fell victim to hackers, who replaced a thumbnail photo on the page with that depicting a sexual act and put up racist content.",http://www.digitalone.com.sg/news/article/18021,3/22/2012,Unknown,Unknown,Defacement,Retail,Singapore,Non,NA,1,Unreported,Unreported,Unreported,No,NA,
-2012-46,WHID 2012-46: Orchard Central's website gets hacked,"Orchard Central's website fell victim to hackers, who replaced a thumbnail photo on the page with that depicting a sexual act and put up racist content.",http://www.digitalone.com.sg/news/article/18021,3/22/2012,Unknown,Unknown,Defacement,Retail,Singapore,Non,NA,1,Unreported,Unreported,Unreported,No,NA,
-2012-47,WHID 2012-47: Anonymous Hackers Target Pope in Mexico,The infamous Anonymous hacker group is not happy about Pope Benedict XVI's arrival in Mexico.,http://latino.foxnews.com/latino/news/2012/03/23/anonymous-hackers-target-pope-in-mexico/?test=latestnews,3/22/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Mexico,Unreported,NA,Multiple,Mexico,Unreported,Unreported,None,NA,
-2012-47,WHID 2012-47: Anonymous Hackers Target Pope in Mexico,The infamous Anonymous hacker group is not happy about Pope Benedict XVI's arrival in Mexico.,http://latino.foxnews.com/latino/news/2012/03/23/anonymous-hackers-target-pope-in-mexico/?test=latestnews,3/22/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Mexico,Unreported,NA,Multiple,Mexico,Unreported,Unreported,None,NA,
-2012-48,WHID 2012-48: Election poll shot down by DDoS-ers,Two local men have been arrested after an online referendum organised by Hong Kong university to poll citizens on their choice of chief executive was disabled in an apparent denial of service attack.,http://www.theregister.co.uk/2012/03/26/hong_kong_vote_hack/,3/23/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,China,Yes,Denial of Service,1,China,Unreported,Unreported,None,NA,
-2012-48,WHID 2012-48: Election poll shot down by DDoS-ers,Two local men have been arrested after an online referendum organised by Hong Kong university to poll citizens on their choice of chief executive was disabled in an apparent denial of service attack.,http://www.theregister.co.uk/2012/03/26/hong_kong_vote_hack/,3/23/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,China,Yes,Denial of Service,1,China,Unreported,Unreported,None,NA,
-2012-49,WHID 2012-49: Dating Website Dedicated To US Military Personnel Hacked By LulzSec,"LulzSec, the hacking group responsible for breaching into a series of websites during spring of the year 2011, is back, according a rumor spread all over US.",http://www.techgadgetsweb.com/8364/dating-website-dedicated-military-personnel-hacked-lulzsec,3/28/2012,Unknown,Unknown,Leakage of Information,Entertainment,"Scottsdale, Arizona",None,NA,1,Unreported,Apache 2.0.63,Unreported,Email addresses,Nearly 171000,
-2012-49,WHID 2012-49: Dating Website Dedicated To US Military Personnel Hacked By LulzSec,"LulzSec, the hacking group responsible for breaching into a series of websites during spring of the year 2011, is back, according a rumor spread all over US.",http://www.techgadgetsweb.com/8364/dating-website-dedicated-military-personnel-hacked-lulzsec,3/28/2012,Unknown,Unknown,Leakage of Information,Entertainment,"Scottsdale, Arizona",None,NA,1,Unreported,Apache 2.0.63,Unreported,Email addresses,Nearly 171000,
-2012-4,WHID 2012-4: Hacker Group Anonymous Takes Down Over 40 Child Porn Sites,The group of computer hackers known as Anonymous has turned its attention from corporations long enough to attack and take down over 40 child porn websites run by pedophiles.,http://www.skyvalleychronicle.com/BREAKING-NEWS/HACKER-GROUP-ANONYMOUS-TAKES-DOWN-OVER-40-CHILD-PORN-SITES-874450,1/10/2012,Unknown,Unknown,Downtime,Hosting Provider,South Africa,Unknown,N/A,40+,Unknown,,,User names,1589,
-2012-50,"WHID 2012-50: Pak government website hacked, 'Indians' blamed",A section of Pakistan's Federal Tax Ombudsman (FTO) website was hacked with a media report describing this as the handiwork of 'Indians???.,http://zeenews.india.com/news/south-asia/pak-government-website-hacked-indians-blamed_767145.html,3/30/2012,Unknown,Unknown,Defacement,Government,Pakistan,No,NA,1,Claimed to be India,Unreported,Unreported,None,NA,
-2012-50,"WHID 2012-50: Pak government website hacked, 'Indians' blamed",A section of Pakistan's Federal Tax Ombudsman (FTO) website was hacked with a media report describing this as the handiwork of 'Indians???.,http://zeenews.india.com/news/south-asia/pak-government-website-hacked-indians-blamed_767145.html,3/30/2012,Unknown,Unknown,Defacement,Government,Pakistan,No,NA,1,Claimed to be India,Unreported,Unreported,None,NA,
-2012-51,WHID 2012-51: FAM Website Hacked,The website of the Football Association of Malaysia (FAM) was hacked by irresponsible parties.,http://www.bernama.com/bernama/v6/newssport.php?id=656042,3/30/2012,Unknown,Unknown,Defacement,Sports,Malaysia,No,NA,1,Unreported,Unreported,Unreported,None,NA,
-2012-51,WHID 2012-51: FAM Website Hacked,The website of the Football Association of Malaysia (FAM) was hacked by irresponsible parties.,http://www.bernama.com/bernama/v6/newssport.php?id=656042,3/30/2012,Unknown,Unknown,Defacement,Sports,Malaysia,No,NA,1,Unreported,Unreported,Unreported,None,NA,
-2012-52,WHID 2012-52: Anonymous Takes Down And Defaces Chinese Government Web Sites,All has been relatively quiet on the Anonymous front as far as defacing Web sites are concerned. That has changed today as Anonymous China has attacked and defaced a number of Chinese government Web sites to protest the country???s censorship of the Internet.,http://www.webpronews.com/anonymous-takes-down-and-defaces-chines-government-web-sites-2012-03,3/30/2012,Unknown,Unknown,Downtime,Government,China,Yes,Denial of Service,Multiple,China,Unreported,Unreported,None,NA,
-2012-52,WHID 2012-52: Anonymous Takes Down And Defaces Chinese Government Web Sites,All has been relatively quiet on the Anonymous front as far as defacing Web sites are concerned. That has changed today as Anonymous China has attacked and defaced a number of Chinese government Web sites to protest the country???s censorship of the Internet.,http://www.webpronews.com/anonymous-takes-down-and-defaces-chines-government-web-sites-2012-03,3/30/2012,Unknown,Unknown,Downtime,Government,China,Yes,Denial of Service,Multiple,China,Unreported,Unreported,None,NA,
-2012-53,WHID 2012-53: Westchester County's website hacked,A spokesman for County Executive Rob Astorino said Friday that Westchester County???s web site had been accessed and that the intruders had left a message declaring that they had hacked the site.,http://www.lohud.com/article/20120330/NEWS02/120330015/Westchester-County-s-website-hacked,3/30/2012,Unknown,Unknown,Downtime,Government,"Westchester, New York",Non,NA,1,Unreported,Unreported,Unreported,Yes,Unreported,
-2012-53,WHID 2012-53: Westchester County's website hacked,A spokesman for County Executive Rob Astorino said Friday that Westchester County???s web site had been accessed and that the intruders had left a message declaring that they had hacked the site.,http://www.lohud.com/article/20120330/NEWS02/120330015/Westchester-County-s-website-hacked,3/30/2012,Unknown,Unknown,Downtime,Government,"Westchester, New York",Non,NA,1,Unreported,Unreported,Unreported,Yes,Unreported,
-2012-54,WHID 2012-54: DDOS Attack,CatholicCulture.org was the victim of a distributed denial of service attack yesterday.,http://www.catholicculture.org/commentary/the-city-gates.cfm?id=253,3/29/2012,Denial of Service,Insufficient Anti-automation,Downtime,Religious,"Manassas, Virginia",Yes,Distributed Denial of Service,1,Unreported,"Microsoft IIS 7, ASP.NET",Unreported,None,NA,
-2012-54,WHID 2012-54: DDOS Attack,CatholicCulture.org was the victim of a distributed denial of service attack yesterday.,http://www.catholicculture.org/commentary/the-city-gates.cfm?id=253,3/29/2012,Denial of Service,Insufficient Anti-automation,Downtime,Religious,"Manassas, Virginia",Yes,Distributed Denial of Service,1,Unreported,"Microsoft IIS 7, ASP.NET",Unreported,None,NA,
-2012-55,WHID 2012-55: Denial of Service Attack Targets Epoch Times,The Epoch Times was hit with a series of cyber attacks.,http://www.theepochtimes.com/n2/technology/denial-of-service-attack-targets-epoch-times-213907.html,4/1/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,China,Yes,Denial of Service,2,Unreported,Unreported,Unreported,None,NA,
-2012-55,WHID 2012-55: Denial of Service Attack Targets Epoch Times,The Epoch Times was hit with a series of cyber attacks.,http://www.theepochtimes.com/n2/technology/denial-of-service-attack-targets-epoch-times-213907.html,4/1/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,China,Yes,Denial of Service,2,Unreported,Unreported,Unreported,None,NA,
-2012-56,WHID 2012-56: Anonymous hacks hundreds of Chinese government sites,"Anonymous has hacked hundreds of Chinese government websites. Some sites were just defaced, but others have had administrator accounts, phone numbers, and e-mail addresses leaked.",http://www.zdnet.com/blog/security/anonymous-hacks-hundreds-of-chinese-government-sites/11303,3/30/2012,Unknown,Unknown,Leakage of Information,Government,China,Unreported,NA,485+,China,Unreported,Unreported,"administrator accounts, phone numbers, and e-mail addresses",Two accounts and passwords 548 phone numbers. 860 e-mail addresses.,
-2012-56,WHID 2012-56: Anonymous hacks hundreds of Chinese government sites,"Anonymous has hacked hundreds of Chinese government websites. Some sites were just defaced, but others have had administrator accounts, phone numbers, and e-mail addresses leaked.",http://www.zdnet.com/blog/security/anonymous-hacks-hundreds-of-chinese-government-sites/11303,3/30/2012,Unknown,Unknown,Leakage of Information,Government,China,Unreported,NA,485+,China,Unreported,Unreported,"administrator accounts, phone numbers, and e-mail addresses",Two accounts and passwords 548 phone numbers. 860 e-mail addresses.,
-2012-57,WHID 2012-57: Home Office Website 'Hacked By Anonymous' Over Email Snooping,The Home Office tonight acknowledged it had been the target of an online protest after its website was taken down in an apparent backlash against Government extradition and surveillance policies.,http://www.huffingtonpost.co.uk/2012/04/07/home-office-website-hacked-anonymous-email-snooping_n_1410220.html?ref=uk,4/7/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,United Kingdom,Yes,Denial of Service,1,Unreported,Apache,Unreported,None,NA,
-2012-57,WHID 2012-57: Home Office Website 'Hacked By Anonymous' Over Email Snooping,The Home Office tonight acknowledged it had been the target of an online protest after its website was taken down in an apparent backlash against Government extradition and surveillance policies.,http://www.huffingtonpost.co.uk/2012/04/07/home-office-website-hacked-anonymous-email-snooping_n_1410220.html?ref=uk,4/7/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,United Kingdom,Yes,Denial of Service,1,Unreported,Apache,Unreported,None,NA,
-2012-58,WHID 2012-58: City of Eau Claire???s website hacked Thursday night,The City of Eau Claire spent time restoring its website after it was hacked,http://www.weau.com/home/headlines/City_of_Eau_Claires_website_hacked_Thursday_night_146380865.html?storySection=story,4/5/2012,Unknown,Unknown,Downtime,Government,Wisconson,No,NA,1,Unreported,Apache/ PHP,Unreported,None,NA,
-2012-58,WHID 2012-58: City of Eau Claire???s website hacked Thursday night,The City of Eau Claire spent time restoring its website after it was hacked,http://www.weau.com/home/headlines/City_of_Eau_Claires_website_hacked_Thursday_night_146380865.html?storySection=story,4/5/2012,Unknown,Unknown,Downtime,Government,Wisconson,No,NA,1,Unreported,Apache/ PHP,Unreported,None,NA,
-2012-59,WHID 2012-58: 'Anonymous' declares 'Blitzkrieg' on neo-Nazis,"???Anonymous??? hackers have declared ???Blitzkrieg??? on neo-Nazis for the New Year, disabling a number of their websites and publishing lists of extreme-right supporters.",http://www.thelocal.de/society/20120102-39867.html,1/2/2012,Denial of Service,Insufficient Anti-automation,Downtime,Politics,"Frankfurt, Germany",Yes,Anonymous,15,,,,,,
-2012-59,WHID 2012-58: 'Anonymous' declares 'Blitzkrieg' on neo-Nazis,"???Anonymous??? hackers have declared ???Blitzkrieg??? on neo-Nazis for the New Year, disabling a number of their websites and publishing lists of extreme-right supporters.",http://www.thelocal.de/society/20120102-39867.html,1/2/2012,Denial of Service,Insufficient Anti-automation,Downtime,Politics,"Frankfurt, Germany",Yes,Anonymous,15,,,,,,
-2012-5,WHID 2012-5: Mass SQL Injection Storm Uses Search Engines And Automation,Security researchers monitoring mass SQL injection attacks warned the latest one may be nearing a million infected pages using a combination of automated tools with reconnaissance information gathered from search engines. This follows similar storms last year.,http://www.techweekeurope.co.uk/news/mass-sql-injection-storm-uses-search-engines-and-automation-to-infect-sites-53567,1/11/2012,SQL Injection,Improper Input Handling,Planting of Malware,Multiple,Multiple locations,No,N/A,Multiple,,,,,,
-2012-60,WHID 2012-60: Cyber attack strands ETrade customers,"AUSTRALIA'S second-biggest online broking business, ANZ Bank's ETrade, was forced to shut down over the Christmas-New Year period by a ''malicious'' cyber attack offshore. Read more: http://www.smh.com.au/business/cyber-attack-strands-etrade-customers-20120104-1pl3x.html#ixzz1rvmJvu3b",http://www.smh.com.au/business/cyber-attack-strands-etrade-customers-20120104-1pl3x.html,1/5/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,Australia,,,,,,,,,
-2012-60,WHID 2012-60: Cyber attack strands ETrade customers,"AUSTRALIA'S second-biggest online broking business, ANZ Bank's ETrade, was forced to shut down over the Christmas-New Year period by a ''malicious'' cyber attack offshore. Read more: http://www.smh.com.au/business/cyber-attack-strands-etrade-customers-20120104-1pl3x.html#ixzz1rvmJvu3b",http://www.smh.com.au/business/cyber-attack-strands-etrade-customers-20120104-1pl3x.html,1/5/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,Australia,,,,,,,,,
-2012-61,WHID 2012-61: Saudi Hackers Post Israeli Credit Card Numbers Online,"A group of Saudi hackers dubbed Group-XP claimed on Monday to have posted the personal information of nearly half a million Israelis online, though credit card companies said the number of compromised records is actually much lower.","http://www.pcmag.com/article2/0,2817,2398297,00.asp",1/3/2012,Unknown,Unknown,Leakage of Information,Finance,Israel,,,,,,,,,
-2012-61,WHID 2012-61: Saudi Hackers Post Israeli Credit Card Numbers Online,"A group of Saudi hackers dubbed Group-XP claimed on Monday to have posted the personal information of nearly half a million Israelis online, though credit card companies said the number of compromised records is actually much lower.","http://www.pcmag.com/article2/0,2817,2398297,00.asp",1/3/2012,Unknown,Unknown,Leakage of Information,Finance,Israel,,,,,,,,,
-2012-62,"WHID 2012-62: Double wham bam: AntiSec hacks, dumps CA & NY law enforcement emails","Almost like an echo from retired hackers, those from the 90s who long ago faded into the ether, the motto for 2011 may have been along the lines of ""hack the planet."" Yet there are some who obviously learned nothing about the consequences of maintaining sloppy security in 2011. In the cyber world, 2012 was not greeted by the boom of fireworks but by a double wham bam to law enforcement in California and New York.",http://blogs.computerworld.com/19507/double_wham_bam_antisec_hacks_dumps_ca_ny_law_enforcement_emails,1/3/2012,Unknown,Unknown,Leakage of Information,Law Enforcement,New York,,,,,,,,,
-2012-62,"WHID 2012-62: Double wham bam: AntiSec hacks, dumps CA & NY law enforcement emails","Almost like an echo from retired hackers, those from the 90s who long ago faded into the ether, the motto for 2011 may have been along the lines of ""hack the planet."" Yet there are some who obviously learned nothing about the consequences of maintaining sloppy security in 2011. In the cyber world, 2012 was not greeted by the boom of fireworks but by a double wham bam to law enforcement in California and New York.",http://blogs.computerworld.com/19507/double_wham_bam_antisec_hacks_dumps_ca_ny_law_enforcement_emails,1/3/2012,Unknown,Unknown,Leakage of Information,Law Enforcement,New York,,,,,,,,,
-2012-63,WHID 2012-63: Singapore University hacked,"Update: Hackers have broken into the National University of Singapore and made staff usernames, domain information and hashed passwords public.","http://www.scmagazine.com.au/News/285906,singapore-university-hacked.aspx",1/5/2012,SQL Injection,Improper Input Handling,Leakage of Information,Education,Singapore,,,,Russia,,,,,
-2012-63,WHID 2012-63: Singapore University hacked,"Update: Hackers have broken into the National University of Singapore and made staff usernames, domain information and hashed passwords public.","http://www.scmagazine.com.au/News/285906,singapore-university-hacked.aspx",1/5/2012,SQL Injection,Improper Input Handling,Leakage of Information,Education,Singapore,,,,Russia,,,,,
-2012-64,WHID 2012-64: Care2 political social network hacked,"Care2.com, a social networking website for activists, has decided to reset the account passwords of almost 18 million registered members after hackers gained access to its servers.",http://www.computerworlduk.com/news/security/3327948/care2-political-social-network-hacked/,1/5/2012,Unknown,Unknown,Leakage of Information,Social,"Redwood City, CA",,,,,,,,,
-2012-64,WHID 2012-64: Care2 political social network hacked,"Care2.com, a social networking website for activists, has decided to reset the account passwords of almost 18 million registered members after hackers gained access to its servers.",http://www.computerworlduk.com/news/security/3327948/care2-political-social-network-hacked/,1/5/2012,Unknown,Unknown,Leakage of Information,Social,"Redwood City, CA",,,,,,,,,
-2012-65,"WHID 2012-65: Hackers steal 45,000 Facebook passwords","THE SOCIAL NETWORK Facebook has been hit by a malware worm called Ramnit, which has gained access to the login details of more than 45,000 users. Source: The Inquirer (http://s.tt/157jZ)",http://www.theinquirer.net/inquirer/news/2135748/hackers-steal-facebook-passwords,1/6/2012,Stolen Credentials,Improper Output Handling,Planting of Malware,Social,California,Yes,Ramnit worm,,,,,,,
-2012-65,"WHID 2012-65: Hackers steal 45,000 Facebook passwords","THE SOCIAL NETWORK Facebook has been hit by a malware worm called Ramnit, which has gained access to the login details of more than 45,000 users. Source: The Inquirer (http://s.tt/157jZ)",http://www.theinquirer.net/inquirer/news/2135748/hackers-steal-facebook-passwords,1/6/2012,Stolen Credentials,Improper Output Handling,Planting of Malware,Social,California,Yes,Ramnit worm,,,,,,,
-2012-66,WHID 2012-66: Sony Pictures hacked again by Anonymous,"The hacking group Anonymous has confirmed that they have once again hacked Sony Pictures, gaining access to their Facebook account and website.",http://www.afterdawn.com/news/article.cfm/2012/01/06/sony_pictures_hacked_again_by_anonymous,1/6/2012,Unknown,Unknown,Defacement,Entertainment,"Culver City, CA",,,,,,,,,
-2012-66,WHID 2012-66: Sony Pictures hacked again by Anonymous,"The hacking group Anonymous has confirmed that they have once again hacked Sony Pictures, gaining access to their Facebook account and website.",http://www.afterdawn.com/news/article.cfm/2012/01/06/sony_pictures_hacked_again_by_anonymous,1/6/2012,Unknown,Unknown,Defacement,Entertainment,"Culver City, CA",,,,,,,,,
-2012-67,WHID 2012-67: Turkish hackers break French MP???s website,A group of Turkish hackers Cyber-Warrior.org/AKINCILAR broke French MP of Armenian descent Patrick Devedjian???s website.,http://news.am/eng/news/88198.html,1/5/2012,Unknown,Unknown,Defacement,Government,"Paris, France",,,,,,,,,
-2012-67,WHID 2012-67: Turkish hackers break French MP???s website,A group of Turkish hackers Cyber-Warrior.org/AKINCILAR broke French MP of Armenian descent Patrick Devedjian???s website.,http://news.am/eng/news/88198.html,1/5/2012,Unknown,Unknown,Defacement,Government,"Paris, France",,,,,,,,,
-2012-68,WHID 2012-68: Server hacked at OSU Medical Center,"Ohio State University Medical Center has notified 30 patients and 150 students that a hacker might have accessed their names, medical information and/or Social Security numbers.",http://www.dispatch.com/content/stories/local/2012/01/06/OSU-Medical-Center-server-hacked.html,1/6/2012,Unknown,Unknown,Leakage of Information,Healthcare,"Columbus, OH",,,,,,,,,
-2012-68,WHID 2012-68: Server hacked at OSU Medical Center,"Ohio State University Medical Center has notified 30 patients and 150 students that a hacker might have accessed their names, medical information and/or Social Security numbers.",http://www.dispatch.com/content/stories/local/2012/01/06/OSU-Medical-Center-server-hacked.html,1/6/2012,Unknown,Unknown,Leakage of Information,Healthcare,"Columbus, OH",,,,,,,,,
-2012-69,WHID 2012-69: Hackers hit ArcelorMittal's Belgian website,"The online piracy group Anonymous hacked into the Belgian website of industrial giant ArcelorMittal on Friday, posting a video to protest the closure of two blast furnaces in Belgium.",http://www.google.com/hostednews/afp/article/ALeqM5h96a9ZQ7H-z0m5mW1LP6anEUM0qQ?docId=CNG.7cda19e9b40775c4791cfe074e851e06.b1,1/6/2012,Unknown,Unknown,Defacement,Government,"Brussels, Belgium",,Anonymous,,,,,,,
-2012-69,WHID 2012-69: Hackers hit ArcelorMittal's Belgian website,"The online piracy group Anonymous hacked into the Belgian website of industrial giant ArcelorMittal on Friday, posting a video to protest the closure of two blast furnaces in Belgium.",http://www.google.com/hostednews/afp/article/ALeqM5h96a9ZQ7H-z0m5mW1LP6anEUM0qQ?docId=CNG.7cda19e9b40775c4791cfe074e851e06.b1,1/6/2012,Unknown,Unknown,Defacement,Government,"Brussels, Belgium",,Anonymous,,,,,,,
-2012-6,WHID 2012-6: Radical Islamic Web Site Attacked by Hackers,"Arrahmah.com, a Web site categorized by the National Anti-Terrorism Agency and Indonesia???s largest Islamic group as promoting radical jihad and terrorism, could not be accessed on Tuesday, its editor said on Wednesday.",http://www.thejakartaglobe.com/media/radical-islamic-web-site-attacked-by-hackers/490668,1/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,Australia,,,1,Unknown,Unknown,Unknown,None,,
-2012-70,WHID 2012-70: Israeli hackers hit Arab websites,"Israeli hackers decided this past weekend to retaliate in an unorganized fashion: On an Israeli hacking forum, personal details were revealed (including phone numbers) of users from an Arab website that was hacked by an Israeli.",http://www.globes.co.il/serveen/globes/docview.asp?did=1000713894,1/9/2012,Unknown,Unknown,Leakage of Information,Finance,Saudi Arabia,,,,,,,,,
-2012-70,WHID 2012-70: Israeli hackers hit Arab websites,"Israeli hackers decided this past weekend to retaliate in an unorganized fashion: On an Israeli hacking forum, personal details were revealed (including phone numbers) of users from an Arab website that was hacked by an Israeli.",http://www.globes.co.il/serveen/globes/docview.asp?did=1000713894,1/9/2012,Unknown,Unknown,Leakage of Information,Finance,Saudi Arabia,,,,,,,,,
-2012-71,WHID 2012-71: Xbox Live a goldmine for hackers,Fraudsters have etched out a goldmine grey market from Xbox Live by selling hacked gaming profiles loaded with Microsoft Points.,"http://www.scmagazine.com.au/News/286307,xbox-live-a-goldmine-for-hackers.aspx",1/9/2012,Stolen Credentials,Insufficient Authentication,Monetary Loss,Entertainment,"Redmond, WA",,,,,,,,,
-2012-71,WHID 2012-71: Xbox Live a goldmine for hackers,Fraudsters have etched out a goldmine grey market from Xbox Live by selling hacked gaming profiles loaded with Microsoft Points.,"http://www.scmagazine.com.au/News/286307,xbox-live-a-goldmine-for-hackers.aspx",1/9/2012,Stolen Credentials,Insufficient Authentication,Monetary Loss,Entertainment,"Redmond, WA",,,,,,,,,
-2012-72,WHID 2012-72: Pirate Bay block prompts Anonymous to launch DDOS,"Anonymous has struck the websites of two anti-piracy organizations, a day after Finnish ISP Elisa blocked access to The Pirate Bay search engine in response to an injunction requested by one of the organizations.",https://www.computerworld.com/s/article/9223304/Pirate_Bay_block_prompts_Anonymous_to_launch_DDOS,1/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Entertainment,Finland,Yes,Anonymous,,,,,,,
-2012-72,WHID 2012-72: Pirate Bay block prompts Anonymous to launch DDOS,"Anonymous has struck the websites of two anti-piracy organizations, a day after Finnish ISP Elisa blocked access to The Pirate Bay search engine in response to an injunction requested by one of the organizations.",https://www.computerworld.com/s/article/9223304/Pirate_Bay_block_prompts_Anonymous_to_launch_DDOS,1/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Entertainment,Finland,Yes,Anonymous,,,,,,,
-2012-73,WHID 2012-73: Russians in cyber attack on Manly business,CYBER criminals manipulating computer networks across the globe are targeting internet businesses and a Manly trader is warning locals to be wary after his website was temporarily crippled in a high-tech extortion attempt.,http://manly-daily.whereilive.com.au/news/story/russians-in-cyber-attack/,1/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,"Manly, Australia",,,,Russia,,,,,
-2012-73,WHID 2012-73: Russians in cyber attack on Manly business,CYBER criminals manipulating computer networks across the globe are targeting internet businesses and a Manly trader is warning locals to be wary after his website was temporarily crippled in a high-tech extortion attempt.,http://manly-daily.whereilive.com.au/news/story/russians-in-cyber-attack/,1/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,"Manly, Australia",,,,Russia,,,,,
-2012-74,WHID 2012-74: Indian hackers break into DGPR site,A group of Indian hackers-India Cyber Army (ICA)-hacked the Punjab Directorate General of Public Relations (DGPR)???s official website (www.dgprpunjab.com) on Tuesday.,http://www.pakistantoday.com.pk/2012/01/11/city/lahore/indian-hackers-break-into-dgpr-site/,1/11/2012,Unknown,Unknown,Defacement,Government,"Lahore, Pakistan",,,,,,,,,
-2012-74,WHID 2012-74: Indian hackers break into DGPR site,A group of Indian hackers-India Cyber Army (ICA)-hacked the Punjab Directorate General of Public Relations (DGPR)???s official website (www.dgprpunjab.com) on Tuesday.,http://www.pakistantoday.com.pk/2012/01/11/city/lahore/indian-hackers-break-into-dgpr-site/,1/11/2012,Unknown,Unknown,Defacement,Government,"Lahore, Pakistan",,,,,,,,,
-2012-75,WHID 2012-75: Stratfor downed again after brief relaunch,"Stratfor relaunched its website overnight, which included a video from the company's CEO George Friedman thumbing his nose at Anonymous. This morning, the site has been pulled down again.",http://www.zdnet.com.au/stratfor-downed-again-after-brief-relaunch-339329556.htm,1/12/2012,Denial of Service,Insufficient Anti-automation,Downtime,Technology,"Austin, TX",Yes,Anonymous,,,,,,,
-2012-75,WHID 2012-75: Stratfor downed again after brief relaunch,"Stratfor relaunched its website overnight, which included a video from the company's CEO George Friedman thumbing his nose at Anonymous. This morning, the site has been pulled down again.",http://www.zdnet.com.au/stratfor-downed-again-after-brief-relaunch-339329556.htm,1/12/2012,Denial of Service,Insufficient Anti-automation,Downtime,Technology,"Austin, TX",Yes,Anonymous,,,,,,,
-2012-76,WHID 2012-76: Hackers retaliate as Dutch ISPs told to block Pirate Bay,"A Dutch court has ordered two ISPs in that country to block their customers' access to The Pirate Bay, a site often used for copyright-infringing activities. On Wednesday, the Hague district court told the ISPs Ziggo and XS4ALL that they have to block the site within 10 days or face a ???10,000 (??8,315) fine each day that access remains possible. The action against the ISPs was brought by Brein, the Netherlands' rights-holder group. Following the verdict, it appears that hackers claiming to be part of Anonymous have used a denial-of-service attack to make Brein's own site inaccessible.",http://www.zdnet.co.uk/blogs/communication-breakdown-10000030/hackers-retaliate-as-dutch-isps-told-to-block-pirate-bay-10025189/,1/12/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Netherlands,Yes,Anonymous,,,,,,,
-2012-76,WHID 2012-76: Hackers retaliate as Dutch ISPs told to block Pirate Bay,"A Dutch court has ordered two ISPs in that country to block their customers' access to The Pirate Bay, a site often used for copyright-infringing activities. On Wednesday, the Hague district court told the ISPs Ziggo and XS4ALL that they have to block the site within 10 days or face a ???10,000 (??8,315) fine each day that access remains possible. The action against the ISPs was brought by Brein, the Netherlands' rights-holder group. Following the verdict, it appears that hackers claiming to be part of Anonymous have used a denial-of-service attack to make Brein's own site inaccessible.",http://www.zdnet.co.uk/blogs/communication-breakdown-10000030/hackers-retaliate-as-dutch-isps-told-to-block-pirate-bay-10025189/,1/12/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Netherlands,Yes,Anonymous,,,,,,,
-2012-77,WHID 2012-77: FoundationSource.com fends off a web attack,The management firm enlisted reinforcements to quell a denial of service attack.,http://www.internetretailer.com/2012/01/12/foundationsourcecom-fends-web-attack,1/12/2012,Denial of Service,Insufficient Anti-automation,Downtime,Politics,"Fairfield, CT",Yes,,,,,,,,
-2012-77,WHID 2012-77: FoundationSource.com fends off a web attack,The management firm enlisted reinforcements to quell a denial of service attack.,http://www.internetretailer.com/2012/01/12/foundationsourcecom-fends-web-attack,1/12/2012,Denial of Service,Insufficient Anti-automation,Downtime,Politics,"Fairfield, CT",Yes,,,,,,,,
-2012-78,WHID 2012-78: American Express fixes critical security vulnerability,"Charge card company American Express has fixed a security vulnerability on its web site that allowed SQL injection and, therefore, direct access to its server's database. The company acted after The H's associates at heise Security forwarded a tip-off from one of its readers.",http://www.h-online.com/security/news/item/American-Express-fixes-critical-security-vulnerability-1410252.html,1/13/2012,SQL Injection,Improper Input Handling,Leakage of Information,Finance,"El Paso, TX",,,,,,,,,
-2012-78,WHID 2012-78: American Express fixes critical security vulnerability,"Charge card company American Express has fixed a security vulnerability on its web site that allowed SQL injection and, therefore, direct access to its server's database. The company acted after The H's associates at heise Security forwarded a tip-off from one of its readers.",http://www.h-online.com/security/news/item/American-Express-fixes-critical-security-vulnerability-1410252.html,1/13/2012,SQL Injection,Improper Input Handling,Leakage of Information,Finance,"El Paso, TX",,,,,,,,,
-2012-79,WHID 2012-79: ???Operation Italy??? takes down government website,Plans by Anonymous to launch a distributed denial of service attack against www.governo.it were changed half an hour before the attack was scheduled to commence.,http://news.netcraft.com/archives/2012/01/13/operation-italy-takes-down-government-website.html,1/13/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Italy,Yes,Anonymous,,,,,,,
-2012-79,WHID 2012-79: ???Operation Italy??? takes down government website,Plans by Anonymous to launch a distributed denial of service attack against www.governo.it were changed half an hour before the attack was scheduled to commence.,http://news.netcraft.com/archives/2012/01/13/operation-italy-takes-down-government-website.html,1/13/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,Italy,Yes,Anonymous,,,,,,,
-2012-7,WHID 2012-7: Subsidy Protest: EFCC site hacked with False arrests of oil moguls,"Nigerian hackers have tampered with the website of the Economic and Financial Crimes Commission, EFCC, www.efccnigeria.org, posting on the site the false ???arrests???of prominent Nigerian players in the oil sector.",http://pmnewsnigeria.com/2012/01/13/subsidy-protest-efcc-site-hacked-with-false-arrests-oil-moguls/,1/13/2012,Unknown,Unknown,Defacement,Government,Nigeria,N/A,N/A,1,Unknown,Unknown,,,,
-2012-80,WHID 2012-80: Live Blog Platform CoverItLive Hacked,Live-blogging platform CoverItLive revealed Friday night that it will be implementing a required password reset after discovering a hack of its files.,"http://www.pcmag.com/article2/0,2817,2398924,00.asp",1/7/2012,Unknown,Unknown,Leakage of Information,Blogs,"Austin, TX",,,,,,,,,
-2012-80,WHID 2012-80: Live Blog Platform CoverItLive Hacked,Live-blogging platform CoverItLive revealed Friday night that it will be implementing a required password reset after discovering a hack of its files.,"http://www.pcmag.com/article2/0,2817,2398924,00.asp",1/7/2012,Unknown,Unknown,Leakage of Information,Blogs,"Austin, TX",,,,,,,,,
-2012-81,WHID 2012-81: RON PAUL SUPPORTERS HACK TWITTER ACCOUNTS OF RISE AGAINST AND NO DOUBT,"Contrary to what you may have read, popular alternative bands No Doubt and Rise Against have not officially endorsed any presidential candidate. According to Billboard, early Wednesday morning (Jan. 11), both bands had their Twitter accounts hacked by overzealous supporters of Ron Paul.",http://audioinkradio.com/2012/01/no-doubt-rise-against-twitter-hacked-ron-paul-backers,1/13/2012,Unknown,Unknown,Disinformation,Social,"San Francisco, CA",,,,,,,,,
-2012-81,WHID 2012-81: RON PAUL SUPPORTERS HACK TWITTER ACCOUNTS OF RISE AGAINST AND NO DOUBT,"Contrary to what you may have read, popular alternative bands No Doubt and Rise Against have not officially endorsed any presidential candidate. According to Billboard, early Wednesday morning (Jan. 11), both bands had their Twitter accounts hacked by overzealous supporters of Ron Paul.",http://audioinkradio.com/2012/01/no-doubt-rise-against-twitter-hacked-ron-paul-backers,1/13/2012,Unknown,Unknown,Disinformation,Social,"San Francisco, CA",,,,,,,,,
-2012-82,WHID 2012-82: Xbox.com has been hacked claim users,"Possible evidence that Xbox.com has been hacked has emerged in the US, suggesting that the Microsoft Points scandal really does have more to it than just phishing scams. Read more: http://www.metro.co.uk/tech/games/887330-xbox-com-has-been-hacked-claim-users-update-microsoft-response#ixzz1rxAyOi00",http://www.metro.co.uk/tech/games/887330-xbox-com-has-been-hacked-claim-users-update-microsoft-response,1/13/2012,Brute Force,Insufficient Anti-automation,Account Takeover,Entertainment,"Redmond, WA",Yes,,,,,,,,
-2012-82,WHID 2012-82: Xbox.com has been hacked claim users,"Possible evidence that Xbox.com has been hacked has emerged in the US, suggesting that the Microsoft Points scandal really does have more to it than just phishing scams. Read more: http://www.metro.co.uk/tech/games/887330-xbox-com-has-been-hacked-claim-users-update-microsoft-response#ixzz1rxAyOi00",http://www.metro.co.uk/tech/games/887330-xbox-com-has-been-hacked-claim-users-update-microsoft-response,1/13/2012,Brute Force,Insufficient Anti-automation,Account Takeover,Entertainment,"Redmond, WA",Yes,,,,,,,,
-2012-83,WHID 2012-83: Gaza hackers attack Israeli fire services website,"A group hackers succeeded on Thursday night in hacking into the Israeli Fire and Rescue Services' official website. The site's homepage was changed to black with a sneering message from the hackers to the Israeli government and other messages supporting armed resistance against Israel, Israeli media reported.",http://www.allvoices.com/contributed-news/11288572-gaza-hackers-attack-israel-fire-services-website,1/13/2012,Unknown,Unknown,Defacement,Government,"Tel-Aviv, Israel",,,,,,,,,
-2012-83,WHID 2012-83: Gaza hackers attack Israeli fire services website,"A group hackers succeeded on Thursday night in hacking into the Israeli Fire and Rescue Services' official website. The site's homepage was changed to black with a sneering message from the hackers to the Israeli government and other messages supporting armed resistance against Israel, Israeli media reported.",http://www.allvoices.com/contributed-news/11288572-gaza-hackers-attack-israel-fire-services-website,1/13/2012,Unknown,Unknown,Defacement,Government,"Tel-Aviv, Israel",,,,,,,,,
-2012-84,WHID 2012-84: Hackers deface city police website,"Brilliant hackers have defaced some links given on the crime prevention tips page of city police website, www.kochicitypolice.org, entering picture language icons.",http://www.asianage.com/india/hackers-deface-city-police-website-670,1/15/2012,Unknown,Unknown,Defacement,Law Enforcement,"Kochi City, India",,,,,,,,,
-2012-84,WHID 2012-84: Hackers deface city police website,"Brilliant hackers have defaced some links given on the crime prevention tips page of city police website, www.kochicitypolice.org, entering picture language icons.",http://www.asianage.com/india/hackers-deface-city-police-website-670,1/15/2012,Unknown,Unknown,Defacement,Law Enforcement,"Kochi City, India",,,,,,,,,
-2012-85,"WHID 2012-85: Websites of Israel bourse, airline brought down",The websites of Israeli national carrier El Al and the Tel Aviv Stock Exchange were both offline on Monday morning hours after they were reportedly threatened by a hacker claiming to be Saudi.,http://www.bangkokpost.com/tech/computer/275406/websites-of-israel-bourse-airline-brought-down,1/16/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,"Tel-Aviv, Israel",Yes,,,Saudi Arabia,,,,,
-2012-85,"WHID 2012-85: Websites of Israel bourse, airline brought down",The websites of Israeli national carrier El Al and the Tel Aviv Stock Exchange were both offline on Monday morning hours after they were reportedly threatened by a hacker claiming to be Saudi.,http://www.bangkokpost.com/tech/computer/275406/websites-of-israel-bourse-airline-brought-down,1/16/2012,Denial of Service,Insufficient Anti-automation,Downtime,Finance,"Tel-Aviv, Israel",Yes,,,Saudi Arabia,,,,,
-2012-86,WHID 2012-86: HuffPo's Twitter account hacked,Usual tweets with links to stories about celebrities and cute animal photos are joined by racist and homophobic notes on The Huffington Post's Twitter account.,http://news.cnet.com/8301-1023_3-57359471-93/huffpos-twitter-account-hacked/,1/15/2012,Unknown,Unknown,Disinformation,Social,"San Francisco, CA",,,,,,,,,
-2012-86,WHID 2012-86: HuffPo's Twitter account hacked,Usual tweets with links to stories about celebrities and cute animal photos are joined by racist and homophobic notes on The Huffington Post's Twitter account.,http://news.cnet.com/8301-1023_3-57359471-93/huffpos-twitter-account-hacked/,1/15/2012,Unknown,Unknown,Disinformation,Social,"San Francisco, CA",,,,,,,,,
-2012-87,WHID 2012-87: Actress Madhu Shalini???s twitter account hacked,"On realizing that her account was hacked, the actress was quick to retrieve it, giving the hacker little chance to misuse the account",http://articles.timesofindia.indiatimes.com/2012-01-16/news-interviews/30631582_1_twitter-account-hacker-popular-micro-blogging-site,1/16/2012,Unknown,Unknown,Disinformation,Social,"San Francisco, CA",,,,,Twitter,,,,
-2012-87,WHID 2012-87: Actress Madhu Shalini???s twitter account hacked,"On realizing that her account was hacked, the actress was quick to retrieve it, giving the hacker little chance to misuse the account",http://articles.timesofindia.indiatimes.com/2012-01-16/news-interviews/30631582_1_twitter-account-hacker-popular-micro-blogging-site,1/16/2012,Unknown,Unknown,Disinformation,Social,"San Francisco, CA",,,,,Twitter,,,,
-2012-88,WHID 2012-88: Anti-Israeli hackers hit ally Azerbaijan's websites,"Anti-Israeli hackers attacked official websites in the Jewish state's mainly Muslim ally Azerbaijan on Monday, the same day as several Israeli sites were also threatened. To read more: http://www.nowlebanon.com/NewsArchiveDetails.aspx?ID=353180#ixzz1rxH5n79K Only 25% of a given NOW Lebanon article can be republished. For information on republishing rights from NOW Lebanon: http://www.nowlebanon.com/Sub.aspx?ID=125478",http://www.nowlebanon.com/NewsArchiveDetails.aspx?ID=353180,1/16/2012,Unknown,Unknown,Defacement,Government,"Tel-Aviv, Israel",,,,,,,,,
-2012-88,WHID 2012-88: Anti-Israeli hackers hit ally Azerbaijan's websites,"Anti-Israeli hackers attacked official websites in the Jewish state's mainly Muslim ally Azerbaijan on Monday, the same day as several Israeli sites were also threatened. To read more: http://www.nowlebanon.com/NewsArchiveDetails.aspx?ID=353180#ixzz1rxH5n79K Only 25% of a given NOW Lebanon article can be republished. For information on republishing rights from NOW Lebanon: http://www.nowlebanon.com/Sub.aspx?ID=125478",http://www.nowlebanon.com/NewsArchiveDetails.aspx?ID=353180,1/16/2012,Unknown,Unknown,Defacement,Government,"Tel-Aviv, Israel",,,,,,,,,
-2012-89,WHID 2012-89: Nigerian army website hacked by protesters,A Nigerian army website was hacked by cyber activists Monday as protests against a hike in fuel prices continue.,http://observers.france24.com/content/20120116-nigerian-army-website-hacked-protesters-occupy-fuel-subisidy-goodluck-jonathan-lagos-soldiers-roadblocks-strike,1/16/2012,Unknown,Unknown,Defacement,Government,Nigeria,,,,,,,,,
-2012-89,WHID 2012-89: Nigerian army website hacked by protesters,A Nigerian army website was hacked by cyber activists Monday as protests against a hike in fuel prices continue.,http://observers.france24.com/content/20120116-nigerian-army-website-hacked-protesters-occupy-fuel-subisidy-goodluck-jonathan-lagos-soldiers-roadblocks-strike,1/16/2012,Unknown,Unknown,Defacement,Government,Nigeria,,,,,,,,,
-2012-8,"WHID 2012-8: Zappos website hacked; credit card database not affected, CEO says","Zappos.com, the popular online shoe site, was the victim of a cyber attack by a hacker who gained access to part of the company's internal network through one of its servers, Chief Executive Tony Hsieh said in an email to employees Sunday.",http://latimesblogs.latimes.com/technology/2012/01/zappos-hacked.html,1/15/2012,Unknown,Unknown,Leakage of Information,Retail,"Henderson, NV",No,NA,1,Unknown,Unknown,Unknown,User accounts,Unknown,
-2012-90,WHID 2012-90: Namesco customers affected by hackers,"UK ISP Namesco confirmed that a small number of its customers were affected by hackers who broke into the company system and stole some personal data, including credit card information, ISPreview reported.",http://www.telecompaper.com/news/namesco-customers-affected-by-hackers,1/16/2012,Unknown,Unknown,Leakage of Information,Service Provider,UK,,,,,,,,,
-2012-90,WHID 2012-90: Namesco customers affected by hackers,"UK ISP Namesco confirmed that a small number of its customers were affected by hackers who broke into the company system and stole some personal data, including credit card information, ISPreview reported.",http://www.telecompaper.com/news/namesco-customers-affected-by-hackers,1/16/2012,Unknown,Unknown,Leakage of Information,Service Provider,UK,,,,,,,,,
-2012-91,WHID 2012-91: Hackers spread malware via children's gaming websites,"Hackers are increasingly targeting child-focused gaming websites, according to a leading anti-virus firm.",http://www.bbc.co.uk/news/technology-16576542,1/16/2012,Unknown,Improper Output Handling,Planting of Malware,Entertainment,"Fortitude Valley, Australia",,,,,,,,,
-2012-91,WHID 2012-91: Hackers spread malware via children's gaming websites,"Hackers are increasingly targeting child-focused gaming websites, according to a leading anti-virus firm.",http://www.bbc.co.uk/news/technology-16576542,1/16/2012,Unknown,Improper Output Handling,Planting of Malware,Entertainment,"Fortitude Valley, Australia",,,,,,,,,
-2012-92,"WHID 2012-92: Ashton Kutcher's FourSquare, Twitter hacked","Hackers broke into the FourSquare and Twitter accounts of actor Ashton Kutcher, claiming to confirm he was in a romantic relationship with Lorene Scafaria.",http://www.gmanetwork.com/news/story/244942/scitech/socialmedia/ashton-kutcher-s-foursquare-twitter-hacked,1/18/2012,Unknown,Unknown,Account Takeover,Social,San Francisco,,,,,,,,,
-2012-92,"WHID 2012-92: Ashton Kutcher's FourSquare, Twitter hacked","Hackers broke into the FourSquare and Twitter accounts of actor Ashton Kutcher, claiming to confirm he was in a romantic relationship with Lorene Scafaria.",http://www.gmanetwork.com/news/story/244942/scitech/socialmedia/ashton-kutcher-s-foursquare-twitter-hacked,1/18/2012,Unknown,Unknown,Account Takeover,Social,San Francisco,,,,,,,,,
-2012-93,WHID 2012-93: Hackers steal $6.7M in cyber bank robbery,"Most of the hackers we talk about here are out to steal credit card numbers and harass. Some of the hacks result in illicit gains, but few that we have talked about have been able to pull the massive amount of funds that hackers who hit the South African Postbank have grabbed. These hackers were able to steal $6.7 million from the bank.",http://www.slashgear.com/hackers-steal-6-7m-in-cyber-bank-robbery-18209697/,1/18/2012,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,"Johannesburg, South Africa",,,,,,,,,
-2012-93,WHID 2012-93: Hackers steal $6.7M in cyber bank robbery,"Most of the hackers we talk about here are out to steal credit card numbers and harass. Some of the hacks result in illicit gains, but few that we have talked about have been able to pull the massive amount of funds that hackers who hit the South African Postbank have grabbed. These hackers were able to steal $6.7 million from the bank.",http://www.slashgear.com/hackers-steal-6-7m-in-cyber-bank-robbery-18209697/,1/18/2012,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,"Johannesburg, South Africa",,,,,,,,,
-2012-94,"WHID 2012-94: VideoGamesPlus.ca hacked, 21,000 users' details stolen","VGP admitted it was ""currently investigating a security issue"" in a generic email addressed to users, passed to Eurogamer this evening. The company recommends users change their passwords ""as a safety precaution"" and apologised ""for any inconvenience caused"".",http://www.eurogamer.net/articles/2012-01-18-videogamesplus-ca-hacked-21-000-users-details-stolen,1/18/2012,Unknown,Unknown,Leakage of Information,Entertainment,"Ontario, Canada",,,,,,,,,
-2012-94,"WHID 2012-94: VideoGamesPlus.ca hacked, 21,000 users' details stolen","VGP admitted it was ""currently investigating a security issue"" in a generic email addressed to users, passed to Eurogamer this evening. The company recommends users change their passwords ""as a safety precaution"" and apologised ""for any inconvenience caused"".",http://www.eurogamer.net/articles/2012-01-18-videogamesplus-ca-hacked-21-000-users-details-stolen,1/18/2012,Unknown,Unknown,Leakage of Information,Entertainment,"Ontario, Canada",,,,,,,,,
-2012-95,WHID 2012-95: T-Mobile reused staff passwords,A hacking group has dumped internal login-in details for T-Mobile staff revealing the US telco had reused passwords for multiple accounts.,"http://www.scmagazine.com.au/News/287402,t-mobile-reused-staff-passwords.aspx",1/19/2012,SQL Injection,Improper Input Handling,Leakage of Information,Technology,"Bonn, DE",,,,,,,,,
-2012-95,WHID 2012-95: T-Mobile reused staff passwords,A hacking group has dumped internal login-in details for T-Mobile staff revealing the US telco had reused passwords for multiple accounts.,"http://www.scmagazine.com.au/News/287402,t-mobile-reused-staff-passwords.aspx",1/19/2012,SQL Injection,Improper Input Handling,Leakage of Information,Technology,"Bonn, DE",,,,,,,,,
-2012-96,"WHID 2012-96: Israeli hacker steals 85,000 Facebook logins from Arabs","An Israeli hacker who goes by the name Hannibal this week stole ???85,000??_ Facebook logins from Arab users of the social network, as part of an online hacker war being fought in the Middle East.",https://www.zdnet.com/blog/facebook/israeli-hacker-steals-85000-facebook-logins-from-arabs/7758,1/19/2012,Unknown,Unknown,Leakage of Information,Social,"San Francisco, CA",,,,,,,,,
-2012-96,"WHID 2012-96: Israeli hacker steals 85,000 Facebook logins from Arabs","An Israeli hacker who goes by the name Hannibal this week stole ???85,000??_ Facebook logins from Arab users of the social network, as part of an online hacker war being fought in the Middle East.",https://www.zdnet.com/blog/facebook/israeli-hacker-steals-85000-facebook-logins-from-arabs/7758,1/19/2012,Unknown,Unknown,Leakage of Information,Social,"San Francisco, CA",,,,,,,,,
-2012-97,"WHID 2012-97: Israeli hacker posts ???100,000??_ more stolen Facebook logins","Israeli hacker Hannibal claims to have stolen another 100,000 Facebook logins from Arab users of the social network. A quick analysis shows that the number is actually closer to 20,000 accounts.",https://www.zdnet.com/blog/facebook/israeli-hacker-posts-8216100000-8242-more-stolen-facebook-logins/7837,1/21/2012,Unknown,Unknown,Leakage of Information,Social,San Francisco,,,,Israel,,,,,
-2012-97,"WHID 2012-97: Israeli hacker posts ???100,000??_ more stolen Facebook logins","Israeli hacker Hannibal claims to have stolen another 100,000 Facebook logins from Arab users of the social network. A quick analysis shows that the number is actually closer to 20,000 accounts.",https://www.zdnet.com/blog/facebook/israeli-hacker-posts-8216100000-8242-more-stolen-facebook-logins/7837,1/21/2012,Unknown,Unknown,Leakage of Information,Social,San Francisco,,,,Israel,,,,,
-2012-98,"WHID 2012-98: Hackers tap Salem Co. account for $19,000","Computer hackers have broken in and stolen approximately $19,000 by way of an illegal wire transfer from a Salem County bank account that held more than $13 million in funds.",http://www.nj.com/salem/index.ssf/2012/01/hackers_tap_salem_co_account_f.html,1/22/2012,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,"Salem, NJ",,,,,,,,,
-2012-98,"WHID 2012-98: Hackers tap Salem Co. account for $19,000","Computer hackers have broken in and stolen approximately $19,000 by way of an illegal wire transfer from a Salem County bank account that held more than $13 million in funds.",http://www.nj.com/salem/index.ssf/2012/01/hackers_tap_salem_co_account_f.html,1/22/2012,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,"Salem, NJ",,,,,,,,,
-2012-99,WHID 2012-99: 'Anonymous' hackers attack Brazilian websites,The computer hacker group Anonymous attacked websites of Brazil's federal district Saturday as well as one belonging to a Brazilian singer to protest the forced closure of Megaupload.com.,http://www.google.com/hostednews/afp/article/ALeqM5jGNOfn8Ij_BmP_UTSE83cFq_bMDA?docId=CNG.ed2a687c0642d8185d1e4e7ccab9f2c3.6e1,1/21/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,"RIO DE JANEIRO, Brazil",Yes,Anonymous,,,,,,,
-2012-99,WHID 2012-99: 'Anonymous' hackers attack Brazilian websites,The computer hacker group Anonymous attacked websites of Brazil's federal district Saturday as well as one belonging to a Brazilian singer to protest the forced closure of Megaupload.com.,http://www.google.com/hostednews/afp/article/ALeqM5jGNOfn8Ij_BmP_UTSE83cFq_bMDA?docId=CNG.ed2a687c0642d8185d1e4e7ccab9f2c3.6e1,1/21/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,"RIO DE JANEIRO, Brazil",Yes,Anonymous,,,,,,,
-2012-9,"WHID 2012-9: GAME website 'hacked', passwords obtained - Report","There are fears that the GAME website's user database has been hacked, with hackers getting hold of over 200 customers' email addresses and passwords in clear text.",http://www.computerandvideogames.com/332334/game-website-hacked-passwords-obtained-report/,1/16/2012,Shell Injection,Improper Input Handling,Leakage of Information,Entertainment,United Kingdom,No,NA,1,Unknown,,,User accounts,,
-2013-001,WHID 2013-001: OpFuckMohammad - Happy New Year,PastBin DB Dump of data from attack on http://eldorar.com/,http://pastebin.com/yDFK5XEC,1/1/2013,SQL Injection,Improper Input Handling,Leakage of Information,Media,,,,,,,,,,
-2013-001,WHID 2013-001: OpFuckMohammad - Happy New Year,PastBin DB Dump of data from attack on http://eldorar.com/,http://pastebin.com/yDFK5XEC,1/1/2013,SQL Injection,Improper Input Handling,Leakage of Information,Media,,,,,,,,,,
-2013-002,"WHID 201-3-002: Yemen Customs Authority Hacked, User Details Leaked","The hacker known as JokerCracker has breached the official website of Yemen???s Customs Authority (customs.gov.ye), leaking the details of hundreds of users.",http://news.softpedia.com/news/Yemen-Customs-Authority-Hacked-User-Details-Leaked-318245.shtml,1/1/2013,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2013-002,"WHID 201-3-002: Yemen Customs Authority Hacked, User Details Leaked","The hacker known as JokerCracker has breached the official website of Yemen???s Customs Authority (customs.gov.ye), leaking the details of hundreds of users.",http://news.softpedia.com/news/Yemen-Customs-Authority-Hacked-User-Details-Leaked-318245.shtml,1/1/2013,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2013-003,WHID 2013-003: Hacker has breached a large number of websites,"hacker has breached a large number of websites over the past several days, including the Indian National Institute of Technology (nitdgp.ac.in)",http://news.softpedia.com/news/Yemen-Customs-Authority-Hacked-User-Details-Leaked-318245.shtml,1/1/2013,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2013-003,WHID 2013-003: Hacker has breached a large number of websites,"hacker has breached a large number of websites over the past several days, including the Indian National Institute of Technology (nitdgp.ac.in)",http://news.softpedia.com/news/Yemen-Customs-Authority-Hacked-User-Details-Leaked-318245.shtml,1/1/2013,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2013-004,WHID 2013-004: The hacker has breached a large number of websites over the past several days,"The hacker has breached a large number of websites over the past several days, including the Jawaharlal Nehru Centre for Advanced Scientific Research (jncasr.ac.in)",http://news.softpedia.com/news/Yemen-Customs-Authority-Hacked-User-Details-Leaked-318245.shtml,1/1/2013,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2013-004,WHID 2013-004: The hacker has breached a large number of websites over the past several days,"The hacker has breached a large number of websites over the past several days, including the Jawaharlal Nehru Centre for Advanced Scientific Research (jncasr.ac.in)",http://news.softpedia.com/news/Yemen-Customs-Authority-Hacked-User-Details-Leaked-318245.shtml,1/1/2013,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2013-005,WHID 2013-005: Energy Manufacturer Also Victimized by IE Zero Day in Watering Hole Attack,"Researcher Eric Romang said that Capstone Turbine Corp., which builds power generation equipment for utilities, has been infected with malware exploiting CVE 2012-4969 for four months and the latest IE exploit since Dec. 18.",http://threatpost.com/en_us/blogs/energy-manufacturer-also-victimized-ie-zero-day-watering-hole-attack-010213,1/2/2013,Unknown,Unknown,Planting of Malware,Energy,,,,,,,,,,
-2013-005,WHID 2013-005: Energy Manufacturer Also Victimized by IE Zero Day in Watering Hole Attack,"Researcher Eric Romang said that Capstone Turbine Corp., which builds power generation equipment for utilities, has been infected with malware exploiting CVE 2012-4969 for four months and the latest IE exploit since Dec. 18.",http://threatpost.com/en_us/blogs/energy-manufacturer-also-victimized-ie-zero-day-watering-hole-attack-010213,1/2/2013,Unknown,Unknown,Planting of Malware,Energy,,,,,,,,,,
-2013-006,"WHID 2013-006: World Wildlife Foundation China Hacked, Details of 80,000 Users Leaked","A hacker collective called DarkWeb Goons, recently founded by a former member of the Grey Security group, has breached the official website of World Wildlife Foundation China (wwfchina.org).",http://news.softpedia.com/news/World-Wildlife-Foundation-China-Hacked-Details-of-80-000-Users-Leaked-318117.shtml,1/3/2013,SQL Injection,Improper Input Handling,Leakage of Information,Non-Profit,,,,,,,,,,
-2013-006,"WHID 2013-006: World Wildlife Foundation China Hacked, Details of 80,000 Users Leaked","A hacker collective called DarkWeb Goons, recently founded by a former member of the Grey Security group, has breached the official website of World Wildlife Foundation China (wwfchina.org).",http://news.softpedia.com/news/World-Wildlife-Foundation-China-Hacked-Details-of-80-000-Users-Leaked-318117.shtml,1/3/2013,SQL Injection,Improper Input Handling,Leakage of Information,Non-Profit,,,,,,,,,,
-2013-007,"WHID 2013-007: Hacker AnonAcid Publishes Data on 50,000 Ohio Residents","As part of OpRedRoll and Occupy Steubenville, Anonymous' response to the rape of a 15-year-old girl in Steubenville, Ohio last August, hacker AnonAcid recently published the names, birthdates, addresses and other personal data of residents of Steubenville and nearby towns in Ohio.",http://www.esecurityplanet.com/hackers/hacker-anonacid-publishes-data-on-50000-ohio-residents.html,1/3/2013,Unknown,Unknown,Leakage of Information,Government,,,,,,,,,,
-2013-007,"WHID 2013-007: Hacker AnonAcid Publishes Data on 50,000 Ohio Residents","As part of OpRedRoll and Occupy Steubenville, Anonymous' response to the rape of a 15-year-old girl in Steubenville, Ohio last August, hacker AnonAcid recently published the names, birthdates, addresses and other personal data of residents of Steubenville and nearby towns in Ohio.",http://www.esecurityplanet.com/hackers/hacker-anonacid-publishes-data-on-50000-ohio-residents.html,1/3/2013,Unknown,Unknown,Leakage of Information,Government,,,,,,,,,,
-2013-008,WHID 2013-008: ZOL website hacked,"Today we woke up to the tip that the website of one of the largest internet service providers in the country, Zimbabwe Online (ZOL) had been hacked.",http://www.techzim.co.zw/2013/01/zol-website-is-hacked/,1/3/2013,Unknown,Unknown,Defacement,Hosting Providers,,,,,,Joomla,,,,
-2013-008,WHID 2013-008: ZOL website hacked,"Today we woke up to the tip that the website of one of the largest internet service providers in the country, Zimbabwe Online (ZOL) had been hacked.",http://www.techzim.co.zw/2013/01/zol-website-is-hacked/,1/3/2013,Unknown,Unknown,Defacement,Hosting Providers,,,,,,Joomla,,,,
-2013-009,WHID 2013-009: Facebook fixes 'Peeping Tom' webcam bug - AFTER 5 MONTHS,"Facebook had a busy time over the holiday period fixing several security flaws, including a webcam-related vulnerability that allowed hackers to record video from a user's web camera and post it on their timeline.",http://www.theregister.co.uk/2013/01/02/facebook_privacy_bug_fixes/,1/2/2013,Cross-site Request Forgery (CSRF),Insufficient Process Validation,Leakage of Information,Social,,,,,,,,,,
-2013-009,WHID 2013-009: Facebook fixes 'Peeping Tom' webcam bug - AFTER 5 MONTHS,"Facebook had a busy time over the holiday period fixing several security flaws, including a webcam-related vulnerability that allowed hackers to record video from a user's web camera and post it on their timeline.",http://www.theregister.co.uk/2013/01/02/facebook_privacy_bug_fixes/,1/2/2013,Cross-site Request Forgery (CSRF),Insufficient Process Validation,Leakage of Information,Social,,,,,,,,,,
-2013-010,WHID 2013-010: Just in time: Facebook restores New Year???s messaging service after plugging privacy loophole,"Earlier today, social networking giant Facebook was caught with its pants down when blogger Jack Jenkins noticed a privacy flaw with its New Year ???Midnight Delivery??? messaging service.",http://thenextweb.com/facebook/2012/12/31/just-in-time-facebook-restores-new-years-messaging-service-after-plugging-privacy-loophole/,1/1/2013,Forceful Browsing,Predictable Resource Location,Leakage of Information,Social,,,,,,,,,,
-2013-010,WHID 2013-010: Just in time: Facebook restores New Year???s messaging service after plugging privacy loophole,"Earlier today, social networking giant Facebook was caught with its pants down when blogger Jack Jenkins noticed a privacy flaw with its New Year ???Midnight Delivery??? messaging service.",http://thenextweb.com/facebook/2012/12/31/just-in-time-facebook-restores-new-years-messaging-service-after-plugging-privacy-loophole/,1/1/2013,Forceful Browsing,Predictable Resource Location,Leakage of Information,Social,,,,,,,,,,
-2013-011,WHID 2013-011: Foreign Policy Group Gets Hacker Happy New Yea,"The group's website was infected with malware that uses a ""watering hole"" attack -??? waiting for users to visit the site before downloading the malware to their machines.",http://news.discovery.com/tech/council-on-foreign-relations-site-hit-with-malware-130103.htm,1/3/2013,Unknown,Unknown,Planting of Malware,Politics,,,,,,,,,,
-2013-011,WHID 2013-011: Foreign Policy Group Gets Hacker Happy New Yea,"The group's website was infected with malware that uses a ""watering hole"" attack -??? waiting for users to visit the site before downloading the malware to their machines.",http://news.discovery.com/tech/council-on-foreign-relations-site-hit-with-malware-130103.htm,1/3/2013,Unknown,Unknown,Planting of Malware,Politics,,,,,,,,,,
-2013-012,WHID 2013-012: 22 SL Government sites hacked,A number of 22 subdomains of the North Central Provincial Council (nc.gov.lk) owned by the Sri Lanka government have been defaced by Bangladeshi Grey Hat Hackers (BGHH).,http://www.dailymirror.lk/news/24732-22-sl-government-sites-hacked.html,1/3/2013,Unknown,Unknown,Defacement,Government,India,Yes,,22,,,,,,
-2013-012,WHID 2013-012: 22 SL Government sites hacked,A number of 22 subdomains of the North Central Provincial Council (nc.gov.lk) owned by the Sri Lanka government have been defaced by Bangladeshi Grey Hat Hackers (BGHH).,http://www.dailymirror.lk/news/24732-22-sl-government-sites-hacked.html,1/3/2013,Unknown,Unknown,Defacement,Government,India,Yes,,22,,,,,,
-2013-013,WHID 2013-013: DDoS attacks on banks continue into the New Year,A hacktivist group is claiming responsibility for outages affecting nine U.S. bank websites in recent weeks ??? part of a distributed denial-of-service (DDoS) operation that began last fall.,http://www.scmagazine.com/ddos-attacks-on-banks-continue-into-the-new-year/article/274712/,1/4/2013,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2013-013,WHID 2013-013: DDoS attacks on banks continue into the New Year,A hacktivist group is claiming responsibility for outages affecting nine U.S. bank websites in recent weeks ??? part of a distributed denial-of-service (DDoS) operation that began last fall.,http://www.scmagazine.com/ddos-attacks-on-banks-continue-into-the-new-year/article/274712/,1/4/2013,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2013-014,"WHID 2013-014: BB&T, PNC say they've been hit by cyber hackers",BB&T Corp. and PNC Financial Services Corp. said Friday they have experienced this week another wave of website ???denial of service??? disruptions that could be coming from cyber hackers.,http://www.journalnow.com/business/business_news/local/article_31f50e90-56dc-11e2-ada2-0019bb30f31a.html,1/4/2013,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,Yes,,2,,,,,,
-2013-014,"WHID 2013-014: BB&T, PNC say they've been hit by cyber hackers",BB&T Corp. and PNC Financial Services Corp. said Friday they have experienced this week another wave of website ???denial of service??? disruptions that could be coming from cyber hackers.,http://www.journalnow.com/business/business_news/local/article_31f50e90-56dc-11e2-ada2-0019bb30f31a.html,1/4/2013,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,Yes,,2,,,,,,
-2013-015,"WHID 2013-015: Yahoo Mail users hit by widespread hacking, XSS exploit seemingly to blame","Late last night reports started coming in suggesting that Yahoo Mail users have had their accounts hacked. While ???hacked??? is a very broad term nowadays, it does appear that Yahoo email accounts are being compromised after users click on a malicious link they receive in their inboxes.",http://thenextweb.com/insider/2013/01/07/yahoo-mail-users-hit-by-widespread-hacking-xss-exploit-seemingly-to-blame/,1/7/2013,Cross-site Scripting (XSS),Improper Output Handling,Account Hijacking,Web-based Email,,,,,,,,,,
-2013-015,"WHID 2013-015: Yahoo Mail users hit by widespread hacking, XSS exploit seemingly to blame","Late last night reports started coming in suggesting that Yahoo Mail users have had their accounts hacked. While ???hacked??? is a very broad term nowadays, it does appear that Yahoo email accounts are being compromised after users click on a malicious link they receive in their inboxes.",http://thenextweb.com/insider/2013/01/07/yahoo-mail-users-hit-by-widespread-hacking-xss-exploit-seemingly-to-blame/,1/7/2013,Cross-site Scripting (XSS),Improper Output Handling,Account Hijacking,Web-based Email,,,,,,,,,,
-2013-016,"WHID 2013-016: Law firm???s trust account hacked, ???large six figure??? taken","In a scam never seen before in Ontario, a Toronto-area law firm lost ???a large six figure??? over the holidays after a virus gave hackers backdoor access to its bookkeeper???s computer. The virus copied bank account passwords as she typed them.",http://www.lawtimesnews.com/201301079535/Headline-News/Law-firms-trust-account-hacked-large-six-figure-taken,1/7/2013,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,,,,,,,,,,
-2013-016,"WHID 2013-016: Law firm???s trust account hacked, ???large six figure??? taken","In a scam never seen before in Ontario, a Toronto-area law firm lost ???a large six figure??? over the holidays after a virus gave hackers backdoor access to its bookkeeper???s computer. The virus copied bank account passwords as she typed them.",http://www.lawtimesnews.com/201301079535/Headline-News/Law-firms-trust-account-hacked-large-six-figure-taken,1/7/2013,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,,,,,,,,,,
-2013-017,WHID 2013-017: Cyberattack hits Fifth Third for 2nd time in week,"Fifth Third Bank's website was hit with a cyberattack Tuesday causing its second shutdown in a span of five days, the Cincinnati Business Courier reports.",http://www.bizjournals.com/columbus/morning_call/2013/01/cyber-attack-hits-fifth-third-for.html,1/9/2013,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2013-017,WHID 2013-017: Cyberattack hits Fifth Third for 2nd time in week,"Fifth Third Bank's website was hit with a cyberattack Tuesday causing its second shutdown in a span of five days, the Cincinnati Business Courier reports.",http://www.bizjournals.com/columbus/morning_call/2013/01/cyber-attack-hits-fifth-third-for.html,1/9/2013,Denial of Service,Insufficient Anti-automation,Downtime,Finance,,,,,,,,,,
-2013-018,WHID 2013-018: Ubisoft probes sudden rash of hijack attacks on gamers' accounts,Ubisoft is investigating a recent spate of hijackings of gaming accounts belonging to users of its Uplay platform,http://www.theregister.co.uk/2013/01/04/ubisoft_gaming_account_hijack_caper/,1/4/2013,Unknown,Unknown,Account Hijacking,Gaming,,,,,,,,,,
-2013-018,WHID 2013-018: Ubisoft probes sudden rash of hijack attacks on gamers' accounts,Ubisoft is investigating a recent spate of hijackings of gaming accounts belonging to users of its Uplay platform,http://www.theregister.co.uk/2013/01/04/ubisoft_gaming_account_hijack_caper/,1/4/2013,Unknown,Unknown,Account Hijacking,Gaming,,,,,,,,,,
-2013-019,WHID 2013-019: DHS website falls victim to hacktivist intrusion,Hacktivist group NullCrew recently announced a succesful intrusion (though intrusionette might be a better word) against a website in the DHS.GOV domain hierarchy.,http://nakedsecurity.sophos.com/2013/01/07/dhs-website-falls-victim-to-hacktivist-intrusion/,1/7/2013,Forceful Browsing,Predictable Resource Location,Leakage of Information,Government,,,,,,,,,,
-2013-019,WHID 2013-019: DHS website falls victim to hacktivist intrusion,Hacktivist group NullCrew recently announced a succesful intrusion (though intrusionette might be a better word) against a website in the DHS.GOV domain hierarchy.,http://nakedsecurity.sophos.com/2013/01/07/dhs-website-falls-victim-to-hacktivist-intrusion/,1/7/2013,Forceful Browsing,Predictable Resource Location,Leakage of Information,Government,,,,,,,,,,
-2013-020,"WHID 2013-020: Drake International the latest victim of hacking, extortion scheme against companies","Drake International, the Canadian-based job placement firm, confirmed Wednesday that it has been the victim of a hacking scheme by a group seeking to extort payment in exchange for not releasing the personal information of people who have used Drake???s services.",http://business.financialpost.com/2013/01/09/drake-international-confirms-database-with-user-information-hacked/?__lsa=bf4c-db1b,1/9/2013,SQL Injection,Improper Input Handling,Leakage of Information,Consulting,,,,,,,,,,
-2013-020,"WHID 2013-020: Drake International the latest victim of hacking, extortion scheme against companies","Drake International, the Canadian-based job placement firm, confirmed Wednesday that it has been the victim of a hacking scheme by a group seeking to extort payment in exchange for not releasing the personal information of people who have used Drake???s services.",http://business.financialpost.com/2013/01/09/drake-international-confirms-database-with-user-information-hacked/?__lsa=bf4c-db1b,1/9/2013,SQL Injection,Improper Input Handling,Leakage of Information,Consulting,,,,,,,,,,
-2013-021,WHID 2013-021: Two more Cambodia govt sites hacked and defaced,"The Web sites of Cambodia's National Military Police and the Supreme Court had been breached by different hacker groups on Tuesday, and industry watchers note government sites in the country are vulnerable to hacks due to their poor security.",http://www.zdnet.com/two-more-cambodia-govt-sites-hacked-and-defaced-7000009622/,1/10/2013,Unknown,Unknown,Defacement,Government,,,,2,,,,,,
-2013-021,WHID 2013-021: Two more Cambodia govt sites hacked and defaced,"The Web sites of Cambodia's National Military Police and the Supreme Court had been breached by different hacker groups on Tuesday, and industry watchers note government sites in the country are vulnerable to hacks due to their poor security.",http://www.zdnet.com/two-more-cambodia-govt-sites-hacked-and-defaced-7000009622/,1/10/2013,Unknown,Unknown,Defacement,Government,,,,2,,,,,,
-2013-022,"WHID 2013-022: Here?s How Hackers Stole Over $1 Million From 1,600 StubHub Users","The hackers obtained customers? logins through other sources, StubHub said, not by hacking StubHub?s systems.",http://time.com/3024409/over-1000-stubhub-accounts-reportedly-hacked/,3/1/2013,Stolen Credentials,Insufficient Authentication,Monetary Loss,Retail,,,,,,,,,,
-2013-022,"WHID 2013-022: Here?s How Hackers Stole Over $1 Million From 1,600 StubHub Users","The hackers obtained customers? logins through other sources, StubHub said, not by hacking StubHub?s systems.",http://time.com/3024409/over-1000-stubhub-accounts-reportedly-hacked/,3/1/2013,Stolen Credentials,Insufficient Authentication,Monetary Loss,Retail,,,,,,,,,,
-2014-001,WHID 2014-001: MOE website hacked few hours after New Year,"KUALA LUMPUR: The Ministry of Education (MOE) website was allegedly hacked by a group of hackers that called themselves EvilSha0w Team, just a few hours after the country celebrated the New Year, today.",http://www.nst.com.my/latest/moe-website-hacked-few-hours-after-new-year-1.452286,1/1/2014,Unknown,Unknown,Defacement,Government,KUALA LUMPUR,,,,,,,,,
-2014-001,WHID 2014-001: MOE website hacked few hours after New Year,"KUALA LUMPUR: The Ministry of Education (MOE) website was allegedly hacked by a group of hackers that called themselves EvilSha0w Team, just a few hours after the country celebrated the New Year, today.",http://www.nst.com.my/latest/moe-website-hacked-few-hours-after-new-year-1.452286,1/1/2014,Unknown,Unknown,Defacement,Government,KUALA LUMPUR,,,,,,,,,
-2014-002,"WHID 2014-002: Skypes Twitter, Facebook, and blog hacked by Syrian Electronic Army","arlier today, a person (or a few people) breached Skype???s security and hacked its Twitter account, Facebook page, and blog. The group claiming responsibility is the Syrian Electronic Army (SEA). Its message: end spying on the public.",http://thenextweb.com/microsoft/2014/01/01/skypes-twitter-account-blog-get-hacked-sea-demanding-end-spying/#!uFj39,1/1/2014,Unknown,Unknown,Account Takeover,Social,,,,,,,,,,
-2014-002,"WHID 2014-002: Skypes Twitter, Facebook, and blog hacked by Syrian Electronic Army","arlier today, a person (or a few people) breached Skype???s security and hacked its Twitter account, Facebook page, and blog. The group claiming responsibility is the Syrian Electronic Army (SEA). Its message: end spying on the public.",http://thenextweb.com/microsoft/2014/01/01/skypes-twitter-account-blog-get-hacked-sea-demanding-end-spying/#!uFj39,1/1/2014,Unknown,Unknown,Account Takeover,Social,,,,,,,,,,
-2014-003,WHID 2014-003: Pakistani Hackers Leak Data from Financial Services Online Australia,"A group of Pakistani hackers called Pakiz Cyber Squad has leaked user data apparently stolen from the systems of Financial Services Online (FSO), an Australian company that provides insurance, finance, superannuation and investment services.",http://news.softpedia.com/news/Pakistani-Hackers-Leak-Data-from-Financial-Services-Online-Australia-413191.shtml,1/3/2014,Unknown,Unknown,Leakage of Information,Finance,,,,,,,,,,
-2014-003,WHID 2014-003: Pakistani Hackers Leak Data from Financial Services Online Australia,"A group of Pakistani hackers called Pakiz Cyber Squad has leaked user data apparently stolen from the systems of Financial Services Online (FSO), an Australian company that provides insurance, finance, superannuation and investment services.",http://news.softpedia.com/news/Pakistani-Hackers-Leak-Data-from-Financial-Services-Online-Australia-413191.shtml,1/3/2014,Unknown,Unknown,Leakage of Information,Finance,,,,,,,,,,
-2014-004,"WHID 2014-004: Steam Hit By DDoS Attacks, Hackers Claim Responsibility","We had heard how Snapchat got hacked, and how Microsoft???s Skype social media accounts had been hacked, and now according to the latest reports, we are hearing word that Valve???s Steam platform has been attacked by hackers as well who have launched a series of DDoS attacks against the company???s servers, causing outages and rendering gamers unable to play their online games or connecting to the service entirely.",http://www.ubergizmo.com/2014/01/steam-hit-by-ddos-attacks-hackers-claim-responsibility/,1/3/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Gaming,,,,,,,,,,
-2014-004,"WHID 2014-004: Steam Hit By DDoS Attacks, Hackers Claim Responsibility","We had heard how Snapchat got hacked, and how Microsoft???s Skype social media accounts had been hacked, and now according to the latest reports, we are hearing word that Valve???s Steam platform has been attacked by hackers as well who have launched a series of DDoS attacks against the company???s servers, causing outages and rendering gamers unable to play their online games or connecting to the service entirely.",http://www.ubergizmo.com/2014/01/steam-hit-by-ddos-attacks-hackers-claim-responsibility/,1/3/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Gaming,,,,,,,,,,
-2014-005,WHID 2014-005: Battle.net and League of Legend hit with denial of service attacks,Blizzard's Battle.net service has been the target of a denial-of-service attack resulting in intermittent downtime for its game platform as well as server instability on World of Warcraft.,http://www.computerandvideogames.com/443794/battlenet-and-league-of-legend-hit-with-denial-of-service-attacks/,1/3/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Gaming,,,,,,,,,,
-2014-005,WHID 2014-005: Battle.net and League of Legend hit with denial of service attacks,Blizzard's Battle.net service has been the target of a denial-of-service attack resulting in intermittent downtime for its game platform as well as server instability on World of Warcraft.,http://www.computerandvideogames.com/443794/battlenet-and-league-of-legend-hit-with-denial-of-service-attacks/,1/3/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Gaming,,,,,,,,,,
-2014-006,"WHID 2014-006: Hacker Group DERP Takes Down Origin, Battlelog and More With DDoS Attack","A hacker group known as DERP is currently taking down all of EA's gaming servers. Battlelog, a web based social networking service for the Battlefield and Medal of Honor series, is also down.",http://www.ibtimes.co.uk/hacker-group-derp-takes-down-origin-battlelog-more-ddos-attack-1430857,1/3/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Gaming,,,,,,,,,,
-2014-006,"WHID 2014-006: Hacker Group DERP Takes Down Origin, Battlelog and More With DDoS Attack","A hacker group known as DERP is currently taking down all of EA's gaming servers. Battlelog, a web based social networking service for the Battlefield and Medal of Honor series, is also down.",http://www.ibtimes.co.uk/hacker-group-derp-takes-down-origin-battlelog-more-ddos-attack-1430857,1/3/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Gaming,,,,,,,,,,
-2014-007,WHID 2014-007: Highland website hacked,"Computer hackers broke into the website for the Highland Middle School last month, but school officials said that only the home page was changed.",http://www.heraldbulletin.com/education/x12770567/Highland-website-hacked,1/3/2014,Unknown,Unknown,Defacement,Education,,,,,,Wordpress,,,,
-2014-007,WHID 2014-007: Highland website hacked,"Computer hackers broke into the website for the Highland Middle School last month, but school officials said that only the home page was changed.",http://www.heraldbulletin.com/education/x12770567/Highland-website-hacked,1/3/2014,Unknown,Unknown,Defacement,Education,,,,,,Wordpress,,,,
-2014-008,WHID 2014-008: World Poker Tour Amateur Poker League Website Hacked,The league website for free live poker nights across North America and the UK has been compromised and login details exposed.,http://pokerfuse.com/news/live-and-online/world-poker-tour-amateur-poker-league-website-hacked-04-01/,1/4/2014,Unknown,Unknown,Leakage of Information,Gaming,,,,,,,,,,
-2014-008,WHID 2014-008: World Poker Tour Amateur Poker League Website Hacked,The league website for free live poker nights across North America and the UK has been compromised and login details exposed.,http://pokerfuse.com/news/live-and-online/world-poker-tour-amateur-poker-league-website-hacked-04-01/,1/4/2014,Unknown,Unknown,Leakage of Information,Gaming,,,,,,,,,,
-2014-009,WHID 2014-009: Greyhats expose 4.5 million Snapchat phone numbers using ???theoretical??? hack (updated),Greyhat hackers have published the partial phone numbers belonging to more than 4.5 million Snapchat users after exploiting a recently disclosed security weakness that officials of the service had described as theoretical.,http://arstechnica.com/security/2014/01/greyhats-expose-4-5-million-snapchat-phone-numbers-using-theoretical-hack/,1/2/2014,Predictable Resource Location,Insufficient Anti-Automation,Leakage of Information,Social,,,,,,,,,,
-2014-009,WHID 2014-009: Greyhats expose 4.5 million Snapchat phone numbers using ???theoretical??? hack (updated),Greyhat hackers have published the partial phone numbers belonging to more than 4.5 million Snapchat users after exploiting a recently disclosed security weakness that officials of the service had described as theoretical.,http://arstechnica.com/security/2014/01/greyhats-expose-4-5-million-snapchat-phone-numbers-using-theoretical-hack/,1/2/2014,Predictable Resource Location,Insufficient Anti-Automation,Leakage of Information,Social,,,,,,,,,,
-2014-010,WHID 2014-010: World of Warcraft users hit by account-hijacking malware attack,"World of Warcraft players have been hit with a malicious trojan that hijacks accounts even when they're protected by two-factor authentication, officials have warned.",http://arstechnica.com/security/2014/01/world-of-warcraft-users-hit-by-account-hijacking-malware-attack/,1/6/2014,Malware,Insufficient Authentication,Account Takeover,Gaming,,,,,,,,,,
-2014-010,WHID 2014-010: World of Warcraft users hit by account-hijacking malware attack,"World of Warcraft players have been hit with a malicious trojan that hijacks accounts even when they're protected by two-factor authentication, officials have warned.",http://arstechnica.com/security/2014/01/world-of-warcraft-users-hit-by-account-hijacking-malware-attack/,1/6/2014,Malware,Insufficient Authentication,Account Takeover,Gaming,,,,,,,,,,
-2014-011,WHID 2014-011: Sunanda Pushkar claims her Twitter account hacked,"Sunanda Pushkar, the wife of Union minister of state for HRD Shashi Tharoor, has claimed that ""her Twitter account has been hacked"" and the message that came criticizing BJP leader Subramaniam Swamy on her account was not hers.",http://articles.timesofindia.indiatimes.com/2014-01-04/india/45859292_1_twitter-account-sunanda-pushkar-tweet,1/4/2014,Brute Force,Insufficient Authentication,Account Takeover,Social,,,,,,,,,,
-2014-011,WHID 2014-011: Sunanda Pushkar claims her Twitter account hacked,"Sunanda Pushkar, the wife of Union minister of state for HRD Shashi Tharoor, has claimed that ""her Twitter account has been hacked"" and the message that came criticizing BJP leader Subramaniam Swamy on her account was not hers.",http://articles.timesofindia.indiatimes.com/2014-01-04/india/45859292_1_twitter-account-sunanda-pushkar-tweet,1/4/2014,Brute Force,Insufficient Authentication,Account Takeover,Social,,,,,,,,,,
-2014-012,"WHID 2014-012: Hacker Group DERP Attacking Xbox Live Now With DDoS, Sign-In Issue Reported","Infamous hacker group DERP has now become a pain in the A#$ for gaming community, after targeting EA's Origin and some video game servers with DDoS attack the group has now started attacking Xbox Live.",http://www.gamepur.com/news/13200-hacker-group-derp-attacking-xbox-live-now-ddos-sign-issue-reported.html,1/4/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Gaming,,,,,,,,,,
-2014-012,"WHID 2014-012: Hacker Group DERP Attacking Xbox Live Now With DDoS, Sign-In Issue Reported","Infamous hacker group DERP has now become a pain in the A#$ for gaming community, after targeting EA's Origin and some video game servers with DDoS attack the group has now started attacking Xbox Live.",http://www.gamepur.com/news/13200-hacker-group-derp-attacking-xbox-live-now-ddos-sign-issue-reported.html,1/4/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Gaming,,,,,,,,,,
-2014-013,WHID 2014-013: Thousands of visitors to yahoo.com hit with malware attack,Two Internet security firms have reported that Yahoo's advertising servers have been distributing malware to hundreds of thousands of users over the last few days. The attack appears to be the work of malicious parties who have hijacked Yahoo's advertising network for their own ends.,http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/04/thousands-of-visitors-to-yahoo-com-hit-with-malware-attack-researchers-say//?print=1,1/4/2014,Malvertising,Insufficient Output Handling,Planting of Malware,Search Engine,,,,,,,,,,
-2014-013,WHID 2014-013: Thousands of visitors to yahoo.com hit with malware attack,Two Internet security firms have reported that Yahoo's advertising servers have been distributing malware to hundreds of thousands of users over the last few days. The attack appears to be the work of malicious parties who have hijacked Yahoo's advertising network for their own ends.,http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/04/thousands-of-visitors-to-yahoo-com-hit-with-malware-attack-researchers-say//?print=1,1/4/2014,Malvertising,Insufficient Output Handling,Planting of Malware,Search Engine,,,,,,,,,,
-2014-014,WHID 2014-014: Hacker Targets Directors Guild of Canada Website,"A hacker site called ObeySec took over a computer server at the Directors Guild of Canada on the weekend. OUR EDITOR RECOMMENDS Directors Guild of Canada Has New Topper Angelina Jolie Might Testify in News Corp's Phone Hacking Lawsuit The external hacker used the handle legionnaire on Sunday to commandeer the DGC site and obtain the personal data of over 2,000 members, including Canada's top film and TV directors.",http://www.hollywoodreporter.com/news/hacker-targets-directors-guild-canada-668584,1/6/2014,Unknown,Unknown,Leakage of Information,Entertainment,,,,,,,,,,
-2014-014,WHID 2014-014: Hacker Targets Directors Guild of Canada Website,"A hacker site called ObeySec took over a computer server at the Directors Guild of Canada on the weekend. OUR EDITOR RECOMMENDS Directors Guild of Canada Has New Topper Angelina Jolie Might Testify in News Corp's Phone Hacking Lawsuit The external hacker used the handle legionnaire on Sunday to commandeer the DGC site and obtain the personal data of over 2,000 members, including Canada's top film and TV directors.",http://www.hollywoodreporter.com/news/hacker-targets-directors-guild-canada-668584,1/6/2014,Unknown,Unknown,Leakage of Information,Entertainment,,,,,,,,,,
-2014-015,WHID 2014-015: Massive E-toll website security flaw,An unofficial security advisory issued by a hacker identifying themselves as ???Moe1??? has warned E-toll users that the PINs used to log into their E-toll website accounts can be easily obtained if their username is known.,http://mybroadband.co.za/news/security/94446-massive-e-toll-website-security-flaw.html,1/7/2014,Predictable Resource Location,Insufficient Process Validation,Leakage of Information,eCommerce,,,,,,,,,,
-2014-015,WHID 2014-015: Massive E-toll website security flaw,An unofficial security advisory issued by a hacker identifying themselves as ???Moe1??? has warned E-toll users that the PINs used to log into their E-toll website accounts can be easily obtained if their username is known.,http://mybroadband.co.za/news/security/94446-massive-e-toll-website-security-flaw.html,1/7/2014,Predictable Resource Location,Insufficient Process Validation,Leakage of Information,eCommerce,,,,,,,,,,
-2014-016,WHID 2014-016: 24 Mexican Government Websites Hacked by Anonymous,Anonymous hackers have breached and defaced around a couple of dozen websites hosted on Mexican government domains.,http://news.softpedia.com/news/24-Mexican-Government-Websites-Hacked-by-Anonymous-413789.shtml,1/6/2014,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2014-016,WHID 2014-016: 24 Mexican Government Websites Hacked by Anonymous,Anonymous hackers have breached and defaced around a couple of dozen websites hosted on Mexican government domains.,http://news.softpedia.com/news/24-Mexican-Government-Websites-Hacked-by-Anonymous-413789.shtml,1/6/2014,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2014-017,WHID 2014-017: School District Still Using Default Login For Admin Account Surprised To Learn Its Site Has Been Hacked,"A Texas school district is learning the hard way about website security basics. If you'd like to keep your site from being compromised, the very least you can do is reset the default login. According to a post at Hackforums, the Round Rock Independent School District of Austin, TX was using the following name and password for its admin account.",http://www.techdirt.com/articles/20131223/18274325679/school-district-still-using-default-login-admin-account-surprised-to-learn-its-site-has-been-hacked.shtml,1/8/2014,Brute Force,Insufficient Authentication,Defacement,Education,,,,,,,,,,
-2014-017,WHID 2014-017: School District Still Using Default Login For Admin Account Surprised To Learn Its Site Has Been Hacked,"A Texas school district is learning the hard way about website security basics. If you'd like to keep your site from being compromised, the very least you can do is reset the default login. According to a post at Hackforums, the Round Rock Independent School District of Austin, TX was using the following name and password for its admin account.",http://www.techdirt.com/articles/20131223/18274325679/school-district-still-using-default-login-admin-account-surprised-to-learn-its-site-has-been-hacked.shtml,1/8/2014,Brute Force,Insufficient Authentication,Defacement,Education,,,,,,,,,,
-2014-018,WHID 2014-018: Syrian Electronic Army hacks into Forbes.com,"The Syrian Electronic Army, the cyber wing of Bashar al-Assad's army, said it hacked Forbes.com website Friday, claiming it compromised user data, defaced webpages and posted a fake story to the site.",http://www.forbes.com/sites/andygreenberg/2014/02/20/how-the-syrian-electronic-army-hacked-us-a-detailed-timeline/,2/16/2014,Cross-site Request Forgery (CSRF),Unknown,Disinformation,Blog,,,,,,,,,,
-2014-018,WHID 2014-018: Syrian Electronic Army hacks into Forbes.com,"The Syrian Electronic Army, the cyber wing of Bashar al-Assad's army, said it hacked Forbes.com website Friday, claiming it compromised user data, defaced webpages and posted a fake story to the site.",http://www.forbes.com/sites/andygreenberg/2014/02/20/how-the-syrian-electronic-army-hacked-us-a-detailed-timeline/,2/16/2014,Cross-site Request Forgery (CSRF),Unknown,Disinformation,Blog,,,,,,,,,,
-2014-019,WHID 2014-019: Royaldutchshellplc.com website under Denial of Service Attack,"Today the site is being bombarded with Shell Blog comments, made in multiple languages via multiple isp addresses. It appears to be yet another concerted denial of service attack by an unknown party.",http://royaldutchshellplc.com/2014/02/17/royaldutchshellplc-com-website-under-denial-of-service-attack/,2/17/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Utilities,,,,,,,,,,
-2014-019,WHID 2014-019: Royaldutchshellplc.com website under Denial of Service Attack,"Today the site is being bombarded with Shell Blog comments, made in multiple languages via multiple isp addresses. It appears to be yet another concerted denial of service attack by an unknown party.",http://royaldutchshellplc.com/2014/02/17/royaldutchshellplc-com-website-under-denial-of-service-attack/,2/17/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Utilities,,,,,,,,,,
-2014-020,WHID 2014-020: UK MoJ Falls Victim To DDoS Attack,"Another incident last week highlighted the growing cyber threat posed by Distributed Denial of Service (DDoS) attacks on government organisations. On Wednesday one such attack took down the website of the UK Ministry of Justice (MoJ), rendering it inaccessible for about three hours, V3 reported.",http://www.misco.co.uk/blog/news/01707/uk-moj-falls-victim-to-ddos-attack,2/17/2014,Denial of Service,Insufficient Anti-Automation,Downtiime,Government,,,,,,,,,,
-2014-020,WHID 2014-020: UK MoJ Falls Victim To DDoS Attack,"Another incident last week highlighted the growing cyber threat posed by Distributed Denial of Service (DDoS) attacks on government organisations. On Wednesday one such attack took down the website of the UK Ministry of Justice (MoJ), rendering it inaccessible for about three hours, V3 reported.",http://www.misco.co.uk/blog/news/01707/uk-moj-falls-victim-to-ddos-attack,2/17/2014,Denial of Service,Insufficient Anti-Automation,Downtiime,Government,,,,,,,,,,
-2014-021,WHID 2014-021: Hackers Attack University of Costa Rica Publication,"Semanario Universidad, the weekly news publication produced by the University of Costa Rica, saw its website brought down by distributed denial of service (DDOS) attacks in late January.",http://news.co.cr/hackers-attack-university-of-costa-rica-publication/33056/,1/27/2014,Denial of Service,Insufficient Anti-Automation,Downtiime,Media,,,,,,,,,,
-2014-021,WHID 2014-021: Hackers Attack University of Costa Rica Publication,"Semanario Universidad, the weekly news publication produced by the University of Costa Rica, saw its website brought down by distributed denial of service (DDOS) attacks in late January.",http://news.co.cr/hackers-attack-university-of-costa-rica-publication/33056/,1/27/2014,Denial of Service,Insufficient Anti-Automation,Downtiime,Media,,,,,,,,,,
-2014-022,WHID 2014-022: Massive hacking affected Venezuela???s government servers,Hackers around the world are setting their sights on Venezuela???s government web properties following violent repression against anti-government protesters and instances of internet censorship.,http://voxxi.com/2014/02/18/anonymous-hackers-venezuela-servers/,2/17/2014,Unknown,Unknown,Defacement,Government,,Yes,#OpVenezuela,,,,,,,
-2014-022,WHID 2014-022: Massive hacking affected Venezuela???s government servers,Hackers around the world are setting their sights on Venezuela???s government web properties following violent repression against anti-government protesters and instances of internet censorship.,http://voxxi.com/2014/02/18/anonymous-hackers-venezuela-servers/,2/17/2014,Unknown,Unknown,Defacement,Government,,Yes,#OpVenezuela,,,,,,,
-2014-023,"WHID 2014-023: Kickstarter Hacked, Credit Card Data Safe","The group funding site Kickstarter was recently the target of a hack by an unknown individual or group of individuals. Yes, some of the data that the service stores about you ??? if you're a user ??? was tapped into. However, there's a bit of a silver lining: Credit card data and passwords appear relatively safe, with a caveat.","http://www.pcmag.com/article2/0,2817,2453510,00.asp",2/16/2014,Unknown,Unknown,Leakage of Information,Retail,,,,,,,,,,
-2014-023,"WHID 2014-023: Kickstarter Hacked, Credit Card Data Safe","The group funding site Kickstarter was recently the target of a hack by an unknown individual or group of individuals. Yes, some of the data that the service stores about you ??? if you're a user ??? was tapped into. However, there's a bit of a silver lining: Credit card data and passwords appear relatively safe, with a caveat.","http://www.pcmag.com/article2/0,2817,2453510,00.asp",2/16/2014,Unknown,Unknown,Leakage of Information,Retail,,,,,,,,,,
-2014-024,WHID 2014-024: Barcelona Twitter Accounts Hacked by Syrian Electronic Army,"The Syrian Electronic Army, the cyber-wing of Syrian president Bashar al-Assad's regime, has targeted Barcelona football club because of its ties to Qatari money which is ""full of blood and kill.""",http://www.ibtimes.co.uk/barcelona-twitter-accounts-hacked-by-syrian-electronic-army-over-links-qatar-1437064,2/19/2014,Unknown,Unknown,Account Takeover,Social,,,,,,,,,,
-2014-024,WHID 2014-024: Barcelona Twitter Accounts Hacked by Syrian Electronic Army,"The Syrian Electronic Army, the cyber-wing of Syrian president Bashar al-Assad's regime, has targeted Barcelona football club because of its ties to Qatari money which is ""full of blood and kill.""",http://www.ibtimes.co.uk/barcelona-twitter-accounts-hacked-by-syrian-electronic-army-over-links-qatar-1437064,2/19/2014,Unknown,Unknown,Account Takeover,Social,,,,,,,,,,
-2014-025,WHID 2014-025: Stack Overflow goes down for an hour on Sunday due to DDoS attack,"Stack Overflow went out for about an hour on Sunday morning due to a DDoS attack, TechCrunch reported. Stack Overflow is a question and answer website focused on coding that programmers, both professional and amateur, rely on.",http://www.vcpost.com/articles/21665/20140216/stack-overflow-goes-down-for-an-hour-sunday-due-to-ddos-attack.htm,2/16/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Blog,,,,,,,,,,
-2014-025,WHID 2014-025: Stack Overflow goes down for an hour on Sunday due to DDoS attack,"Stack Overflow went out for about an hour on Sunday morning due to a DDoS attack, TechCrunch reported. Stack Overflow is a question and answer website focused on coding that programmers, both professional and amateur, rely on.",http://www.vcpost.com/articles/21665/20140216/stack-overflow-goes-down-for-an-hour-sunday-due-to-ddos-attack.htm,2/16/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Blog,,,,,,,,,,
-2014-026,WHID 2014-026: churchofcyprus.org.cy Hacked,Email and data exposed in PasteBin Dump,http://pastebin.com/9TyDsSR3,2/19/2014,Unknown,Unknown,Leakage of Information,Religious,,,,,,,,,,
-2014-026,WHID 2014-026: churchofcyprus.org.cy Hacked,Email and data exposed in PasteBin Dump,http://pastebin.com/9TyDsSR3,2/19/2014,Unknown,Unknown,Leakage of Information,Religious,,,,,,,,,,
-2014-027,WHID 2014-027: Spotlight On Sochi: Distributed Denial Of Sochi,"Beginning February 4, hacktivists began leveling distributed denial-of-service attacks (DDoS) against at least 1,700 Russian Websites connected to the winter games. The attacks targeted official Websites of the games as well as those owned by hotels and financial institutions connected with the event. As is the case with DDoS attacks, each of the Websites was rendered temporarily unavailable.",http://www.hstoday.us/industry-news/general/single-article/spotlight-on-sochi-distributed-denial-of-sochi-feb-7/e605d5e1db57c00e9c432ca83449b4e1.html,2/7/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,Yes,#OpSochi,,,,,,,
-2014-027,WHID 2014-027: Spotlight On Sochi: Distributed Denial Of Sochi,"Beginning February 4, hacktivists began leveling distributed denial-of-service attacks (DDoS) against at least 1,700 Russian Websites connected to the winter games. The attacks targeted official Websites of the games as well as those owned by hotels and financial institutions connected with the event. As is the case with DDoS attacks, each of the Websites was rendered temporarily unavailable.",http://www.hstoday.us/industry-news/general/single-article/spotlight-on-sochi-distributed-denial-of-sochi-feb-7/e605d5e1db57c00e9c432ca83449b4e1.html,2/7/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,Yes,#OpSochi,,,,,,,
-2014-028,"WHID 2014-028: U-Md. computer security attack exposes 300,000 records","More than 300,000 personal records for faculty, staff and students who have received identification cards at the University of Maryland were compromised in a computer security breach this week, school officials said.",http://www.washingtonpost.com/local/college-park-shady-grove-campuses-affected-by-university-of-maryland-security-breach/2014/02/19/ce438108-99bd-11e3-80ac-63a8ba7f7942_story.html,2/18/2014,Stolen Credentials,Insufficient Authentication,Leakage of Information,Education,,,,,,,,,,
-2014-028,"WHID 2014-028: U-Md. computer security attack exposes 300,000 records","More than 300,000 personal records for faculty, staff and students who have received identification cards at the University of Maryland were compromised in a computer security breach this week, school officials said.",http://www.washingtonpost.com/local/college-park-shady-grove-campuses-affected-by-university-of-maryland-security-breach/2014/02/19/ce438108-99bd-11e3-80ac-63a8ba7f7942_story.html,2/18/2014,Stolen Credentials,Insufficient Authentication,Leakage of Information,Education,,,,,,,,,,
-2014-029,"WHID 2014-029: Hackers hijack 300,000-plus wireless routers, make malicious changes","The hackers appear to be using a variety of techniques to commandeer the devices and make changes to the domain name system (DNS) servers used to translate human-friendly domain names into the IP addresses computers use to locate their Web servers, according to a report published Monday by researchers from security firm Team Cymru. Likely hacks include a recently disclosed cross-site request forgery (CSRF) that allows attackers to inject a blank password into the Web interface of TP-Link routers.",http://arstechnica.com/security/2014/03/hackers-hijack-300000-plus-wireless-routers-make-malicious-changes/,3/3/2014,Cross-site Request Forgery (CSRF),Insufficient Process Validation,DNS Hijacking,Technology,,Yes,,,,,,,,
-2014-029,"WHID 2014-029: Hackers hijack 300,000-plus wireless routers, make malicious changes","The hackers appear to be using a variety of techniques to commandeer the devices and make changes to the domain name system (DNS) servers used to translate human-friendly domain names into the IP addresses computers use to locate their Web servers, according to a report published Monday by researchers from security firm Team Cymru. Likely hacks include a recently disclosed cross-site request forgery (CSRF) that allows attackers to inject a blank password into the Web interface of TP-Link routers.",http://arstechnica.com/security/2014/03/hackers-hijack-300000-plus-wireless-routers-make-malicious-changes/,3/3/2014,Cross-site Request Forgery (CSRF),Insufficient Process Validation,DNS Hijacking,Technology,,Yes,,,,,,,,
-2014-030,WHID 2014-030: Russian media websites hit by ?massive? DDoS attack ?linked to Ukraine?,"Websites of several Russian state TV channels have been hit by a large cyberattack suspected to partly come from Kiev. Anonymous Caucasus claimed it was responsible for hacking Channel One TV?s site, saying it had ?nothing? to do with Ukraine.",http://rt.com/news/russian-media-ddos-ukraine-614/,3/14/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Media,,,,,,,,,,
-2014-030,WHID 2014-030: Russian media websites hit by ?massive? DDoS attack ?linked to Ukraine?,"Websites of several Russian state TV channels have been hit by a large cyberattack suspected to partly come from Kiev. Anonymous Caucasus claimed it was responsible for hacking Channel One TV?s site, saying it had ?nothing? to do with Ukraine.",http://rt.com/news/russian-media-ddos-ukraine-614/,3/14/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Media,,,,,,,,,,
-2014-031,WHID 2014-031: Hackers down Russian presidential site in ?powerful cyber-attack?,Unidentified hackers brought down the Russian presidency?s site and the Central Bank?s web page in a wave of online attacks. The website is now operational for most users.,http://rt.com/news/kremlin-site-attack-hackers-790/,3/14/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,,,,,,,,
-2014-031,WHID 2014-031: Hackers down Russian presidential site in ?powerful cyber-attack?,Unidentified hackers brought down the Russian presidency?s site and the Central Bank?s web page in a wave of online attacks. The website is now operational for most users.,http://rt.com/news/kremlin-site-attack-hackers-790/,3/14/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,,,,,,,,
-2014-032,"WHID 2014-032: EC-Council Acknowledges, Details February Hacker Attack","The defacement, EC-Council explained, resulted from a DNS poisoning attack. After gaining control of the domain, the hacker issued a password reset request to EC-Council's e-mail service provider, which allowed the hacker to compromise some e-mail accounts before EC-Council responded.",http://www.esecurityplanet.com/hackers/ec-council-acknowledges-details-february-hacker-attack.html,3/13/2014,DNS Hijacking,Insufficient Process Validation,Defacement,Technology,,,,,,,,,,
-2014-032,"WHID 2014-032: EC-Council Acknowledges, Details February Hacker Attack","The defacement, EC-Council explained, resulted from a DNS poisoning attack. After gaining control of the domain, the hacker issued a password reset request to EC-Council's e-mail service provider, which allowed the hacker to compromise some e-mail accounts before EC-Council responded.",http://www.esecurityplanet.com/hackers/ec-council-acknowledges-details-february-hacker-attack.html,3/13/2014,DNS Hijacking,Insufficient Process Validation,Defacement,Technology,,,,,,,,,,
-2014-033,"WHID 2014-033: 162,000 WORDPRESS SITES USED IN DDOS ATTACK","More than 162,000 ?popular and clean? WordPress sites were recently used in a large-scale distributed denial of service attack (DDoS) that exploited the content management system?s pingback feature.",http://threatpost.com/162000-wordpress-sites-used-in-ddos-attack/104745,3/12/2014,Denial of Service,Insufficient Process Validation,Downtime,Blog,,,,,,,,,,
-2014-033,"WHID 2014-033: 162,000 WORDPRESS SITES USED IN DDOS ATTACK","More than 162,000 ?popular and clean? WordPress sites were recently used in a large-scale distributed denial of service attack (DDoS) that exploited the content management system?s pingback feature.",http://threatpost.com/162000-wordpress-sites-used-in-ddos-attack/104745,3/12/2014,Denial of Service,Insufficient Process Validation,Downtime,Blog,,,,,,,,,,
-2014-034,WHID 2014-034: Hacker attempts to hold Johns Hopkins hostage using student data,"In an attack on the Johns Hopkins University servers, a hacker was able to obtain the names, emails and phone numbers of some 850 current and past biomedical engineering students.",http://www.cr80news.com/2014/03/12/hacker-attempts-to-hold-johns-hopkins-hostage-using-student-data,3/12/2014,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2014-034,WHID 2014-034: Hacker attempts to hold Johns Hopkins hostage using student data,"In an attack on the Johns Hopkins University servers, a hacker was able to obtain the names, emails and phone numbers of some 850 current and past biomedical engineering students.",http://www.cr80news.com/2014/03/12/hacker-attempts-to-hold-johns-hopkins-hostage-using-student-data,3/12/2014,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2014-035,"WHID 2014-035: Bitcoin Exchange Mt. Gox Hit by 150,000 DDoS Attacks Per Second Before Collapse","Bitcoin exchange Mt. Gox suffered about 150,000 hacking attacks per second for several days before its collapse last month, according to a report.",http://www.ibtimes.co.uk/bitcoin-exchange-mt-gox-hit-by-150000-ddos-attacks-per-second-before-collapse-1439568,3/10/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Finance,,,,,,,,,,
-2014-035,"WHID 2014-035: Bitcoin Exchange Mt. Gox Hit by 150,000 DDoS Attacks Per Second Before Collapse","Bitcoin exchange Mt. Gox suffered about 150,000 hacking attacks per second for several days before its collapse last month, according to a report.",http://www.ibtimes.co.uk/bitcoin-exchange-mt-gox-hit-by-150000-ddos-attacks-per-second-before-collapse-1439568,3/10/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Finance,,,,,,,,,,
-2014-036,"WHID 2014-036: Russian hacker family allegedly steals $58,000 from US bank","MOSCOW, March 12 (RAPSI) ? The police detained suspected hackers in Russia who are believed to have stolen about $58,000 from client accounts of a US bank, the Russian Interior Ministry said in a statement Wednesday.",http://rapsinews.com/news/20140312/270911000.html,3/12/2014,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,,,,,,,,,,
-2014-036,"WHID 2014-036: Russian hacker family allegedly steals $58,000 from US bank","MOSCOW, March 12 (RAPSI) ? The police detained suspected hackers in Russia who are believed to have stolen about $58,000 from client accounts of a US bank, the Russian Interior Ministry said in a statement Wednesday.",http://rapsinews.com/news/20140312/270911000.html,3/12/2014,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,,,,,,,,,,
-2014-037,"WHID 2014-037: Archdiocese of Seattle hacked, warns 90,000","That information is stored in several databases, and the Archdiocese believes one of those databases was hacked. ""The bad guys have figured out how to breach it,"" Magnoni said, ""and so it's unsettling.""",http://www.kirotv.com/news/news/archdiocese-seattle-hacked-warns-90000-employees-a/nd9Xs/,3/11/2014,SQL Injection,Improper Input Handling,Leakage of Information,Religious,,,,,,,,,,
-2014-037,"WHID 2014-037: Archdiocese of Seattle hacked, warns 90,000","That information is stored in several databases, and the Archdiocese believes one of those databases was hacked. ""The bad guys have figured out how to breach it,"" Magnoni said, ""and so it's unsettling.""",http://www.kirotv.com/news/news/archdiocese-seattle-hacked-warns-90000-employees-a/nd9Xs/,3/11/2014,SQL Injection,Improper Input Handling,Leakage of Information,Religious,,,,,,,,,,
-2014-038,WHID 2014-038: Navy Hacking Blamed on Iran Tied to H-P Contract,"The infiltration was launched with a common hacking technique known as an SQL injection. It used a Navy website available to the public and then found its way to the unprotected databases, said people familiar with the matter. The lack of security meant once the hackers were inside, they could easily move into other parts of the network, these people said.",http://online.wsj.com/news/articles/SB10001424052702304732804579423611224344876,3/6/2014,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2014-038,WHID 2014-038: Navy Hacking Blamed on Iran Tied to H-P Contract,"The infiltration was launched with a common hacking technique known as an SQL injection. It used a Navy website available to the public and then found its way to the unprotected databases, said people familiar with the matter. The lack of security meant once the hackers were inside, they could easily move into other parts of the network, these people said.",http://online.wsj.com/news/articles/SB10001424052702304732804579423611224344876,3/6/2014,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2014-039,WHID 2014-039: ComiXology Hacked! Change Your Password Now,"Digital comic book seller ComiXology has suffered a security breach, and is now requiring all users reset their passwords.","http://www.pcmag.com/article2/0,2817,2454664,00.asp",3/6/2014,SQL Injection,Improper Input Handling,Leakage of Information,Media,,,,,,,,,,
-2014-039,WHID 2014-039: ComiXology Hacked! Change Your Password Now,"Digital comic book seller ComiXology has suffered a security breach, and is now requiring all users reset their passwords.","http://www.pcmag.com/article2/0,2817,2454664,00.asp",3/6/2014,SQL Injection,Improper Input Handling,Leakage of Information,Media,,,,,,,,,,
-2014-040,WHID 2014-040: Hackers steal data for 12 million customers at South Korean phone giant,Police have arrested two people in connection with a cyber-attack that yielded personal details for 12 million customers of one of South Korea's biggest phone companies.,http://edition.cnn.com/2014/03/06/business/south-korea-telecoms-hackers/,3/6/2014,Unknown,Unknown,Leakage of Information,Technology,,,,,,,,,,
-2014-040,WHID 2014-040: Hackers steal data for 12 million customers at South Korean phone giant,Police have arrested two people in connection with a cyber-attack that yielded personal details for 12 million customers of one of South Korea's biggest phone companies.,http://edition.cnn.com/2014/03/06/business/south-korea-telecoms-hackers/,3/6/2014,Unknown,Unknown,Leakage of Information,Technology,,,,,,,,,,
-2014-041,WHID 2014-041: EA Games website hacked to steal Apple IDs,An EA Games server has been compromised by hackers and is now hosting a phishing site which targets Apple ID account holders.,http://news.netcraft.com/archives/2014/03/19/ea-games-website-hacked-to-steal-apple-ids.html,3/19/2014,Unknown,Unknown,Phishing,Gaming,,,,,,,,,,
-2014-041,WHID 2014-041: EA Games website hacked to steal Apple IDs,An EA Games server has been compromised by hackers and is now hosting a phishing site which targets Apple ID account holders.,http://news.netcraft.com/archives/2014/03/19/ea-games-website-hacked-to-steal-apple-ids.html,3/19/2014,Unknown,Unknown,Phishing,Gaming,,,,,,,,,,
-2014-042,WHID 2014:042: Estonian Foreign Ministry?s website comes under cyber attack,"The website of the Estonian Ministry of Foreign Affairs came under cyber attack yesterday afternoon, reported ERR.",http://balticbusinessnews.com/article/2014/3/20/estonian-foreign-ministry-s-website-comes-under-cyber-attack,3/20/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,,,,,,,,
-2014-042,WHID 2014:042: Estonian Foreign Ministry?s website comes under cyber attack,"The website of the Estonian Ministry of Foreign Affairs came under cyber attack yesterday afternoon, reported ERR.",http://balticbusinessnews.com/article/2014/3/20/estonian-foreign-ministry-s-website-comes-under-cyber-attack,3/20/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,,,,,,,,
-2014-043,WHID 2014-043: Criminal Malware Used In Attacks On Ukraine Government,"The DirtJumper malware, a tool used by digital criminals during attacks on banks, has started targeting Ukranian government websites, amid growing tensions with neighbouring Russia.",http://www.techweekeurope.co.uk/news/dirtjumper-malware-ukraine-russia-141954,3/19/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,DirtJumer,,,,,,,
-2014-043,WHID 2014-043: Criminal Malware Used In Attacks On Ukraine Government,"The DirtJumper malware, a tool used by digital criminals during attacks on banks, has started targeting Ukranian government websites, amid growing tensions with neighbouring Russia.",http://www.techweekeurope.co.uk/news/dirtjumper-malware-ukraine-russia-141954,3/19/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,DirtJumer,,,,,,,
-2014-044,WHID 2014-044: Citroen becomes the latest victim of Adobe ColdFusion hackers,"A prolific hacker gang that has breached numerous companies by exploiting Adobe software has claimed another major hit in the form of car manufacturer Citro?n, the Guardian has learned.",http://www.theguardian.com/technology/2014/mar/17/citroen-adobe-coldfusion-hacked-backdoor,3/17/2014,Directory Traversal,Improper Input Handling,Planting of Malware,Automotive,,,,,,ColdFusion,,,,
-2014-044,WHID 2014-044: Citroen becomes the latest victim of Adobe ColdFusion hackers,"A prolific hacker gang that has breached numerous companies by exploiting Adobe software has claimed another major hit in the form of car manufacturer Citro?n, the Guardian has learned.",http://www.theguardian.com/technology/2014/mar/17/citroen-adobe-coldfusion-hacked-backdoor,3/17/2014,Directory Traversal,Improper Input Handling,Planting of Malware,Automotive,,,,,,ColdFusion,,,,
-2014-045,WHID 2014-045: Hackers hit Unix servers to send 35 million spam messages a day,"A criminal group has seized control of 25,000 Unix servers since 2011, forcing them to send out more than 35 million malware-laden spam messages per day, according to security researchers at ESET.",http://www.v3.co.uk/v3-uk/news/2334789/hackers-hit-unix-servers-to-send-35-million-spam-messages-a-day,3/19/2014,Unknown,Unknown,Planting of Malware,Technology,,Yes,Windingo,,,,,,,
-2014-045,WHID 2014-045: Hackers hit Unix servers to send 35 million spam messages a day,"A criminal group has seized control of 25,000 Unix servers since 2011, forcing them to send out more than 35 million malware-laden spam messages per day, according to security researchers at ESET.",http://www.v3.co.uk/v3-uk/news/2334789/hackers-hit-unix-servers-to-send-35-million-spam-messages-a-day,3/19/2014,Unknown,Unknown,Planting of Malware,Technology,,Yes,Windingo,,,,,,,
-2014-046,WHID 2014-046: Pro-Russian Ukrainians launch DDoS strike against NATO,"A group of pro-Russian Ukrainians hit NATO with a DDoS attack over the weekend, protesting the organization's stance on Crimea's split from the Ukraine. - See more at: http://blogs.csoonline.com/network-security/3075/pro-russian-ukrainians-launch-ddos-strike-against-nato#sthash.wjqevPXH.dpuf",http://blogs.csoonline.com/network-security/3075/pro-russian-ukrainians-launch-ddos-strike-against-nato,3/17/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Politics,,,,,,,,,,
-2014-046,WHID 2014-046: Pro-Russian Ukrainians launch DDoS strike against NATO,"A group of pro-Russian Ukrainians hit NATO with a DDoS attack over the weekend, protesting the organization's stance on Crimea's split from the Ukraine. - See more at: http://blogs.csoonline.com/network-security/3075/pro-russian-ukrainians-launch-ddos-strike-against-nato#sthash.wjqevPXH.dpuf",http://blogs.csoonline.com/network-security/3075/pro-russian-ukrainians-launch-ddos-strike-against-nato,3/17/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Politics,,,,,,,,,,
-2014-047,WHID 2014-047: Kremlin website hit by 'powerful' cyber attack,"Victories are hard to come by for Vladimir Putin's opponents, activists are jailed, protests draw dwindling crowds, but on Friday they celebrated a minor triumph by briefly knocking out the Kremlin website.",http://www.smh.com.au/it-pro/security-it/kremlin-website-hit-by-powerful-cyber-attack-20140317-hvjme.html,3/17/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,,,,,,,,
-2014-047,WHID 2014-047: Kremlin website hit by 'powerful' cyber attack,"Victories are hard to come by for Vladimir Putin's opponents, activists are jailed, protests draw dwindling crowds, but on Friday they celebrated a minor triumph by briefly knocking out the Kremlin website.",http://www.smh.com.au/it-pro/security-it/kremlin-website-hit-by-powerful-cyber-attack-20140317-hvjme.html,3/17/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,,,,,,,,
-2014-048,WHID 2014-048: Maryland Hacked Again: 2nd Data Breach in 4 Weeks,The University of Maryland says someone hacked into its computer network and obtained personal information for the second time in four weeks.,http://washington.cbslocal.com/2014/03/20/maryland-hacked-again-2nd-data-breach-in-4-weeks/,3/15/2014,Unknown,Unknown,Leakage of Information,Education,,,,,,,,,,
-2014-048,WHID 2014-048: Maryland Hacked Again: 2nd Data Breach in 4 Weeks,The University of Maryland says someone hacked into its computer network and obtained personal information for the second time in four weeks.,http://washington.cbslocal.com/2014/03/20/maryland-hacked-again-2nd-data-breach-in-4-weeks/,3/15/2014,Unknown,Unknown,Leakage of Information,Education,,,,,,,,,,
-2014-049,WHID 2014-049: Russian Central Bank Says Website Hacked Ahead of Rate Decision,"""Currently the bank of Russia website is having troubles due to a hacker attack. The bank of Russia is taking measures to rebuff it and to restore [the website's] normal operation,"" the press office said in a text message.",http://online.wsj.com/article/BT-CO-20140314-701521.html,3/14/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Finance,,,,,,,,,,
-2014-049,WHID 2014-049: Russian Central Bank Says Website Hacked Ahead of Rate Decision,"""Currently the bank of Russia website is having troubles due to a hacker attack. The bank of Russia is taking measures to rebuff it and to restore [the website's] normal operation,"" the press office said in a text message.",http://online.wsj.com/article/BT-CO-20140314-701521.html,3/14/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Finance,,,,,,,,,,
-2014-050,WHID 2014-050: Kenya: Ministry of Transport Website Hacked,Kenya's ministry of transport website has been hacked by a Turkish Muslim group calling itself Ayyildiz Tim which accuses the government of not respecting Islam.,http://allafrica.com/stories/201403051048.html,3/5/2014,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2014-050,WHID 2014-050: Kenya: Ministry of Transport Website Hacked,Kenya's ministry of transport website has been hacked by a Turkish Muslim group calling itself Ayyildiz Tim which accuses the government of not respecting Islam.,http://allafrica.com/stories/201403051048.html,3/5/2014,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2014-051,"WHID 2014-051: Meetup.com DDoSed by extortionist, refuses to pay ransom","But a DDoS is exactly what's been plaguing the site, Scott Heiferman, Meetup.com co-founder and CEO, wrote on the company's blog.",http://nakedsecurity.sophos.com/2014/03/05/meetup-com-ddosed-by-extortionist-refuse-to-pay-ransom/,3/5/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Technology,,,,,,,,,,
-2014-051,"WHID 2014-051: Meetup.com DDoSed by extortionist, refuses to pay ransom","But a DDoS is exactly what's been plaguing the site, Scott Heiferman, Meetup.com co-founder and CEO, wrote on the company's blog.",http://nakedsecurity.sophos.com/2014/03/05/meetup-com-ddosed-by-extortionist-refuse-to-pay-ransom/,3/5/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Technology,,,,,,,,,,
-2014-052,"WHID 2014-052: Attack campaign compromises 300,000 home routers, alters DNS settings","A group of attackers managed to compromise 300,000 home and small-office wireless routers, altering their settings to use rogue DNS servers, according to Internet security research organization Team Cymru.",http://www.pcworld.com/article/2104380/attack-campaign-compromises-300000-home-routers-alters-dns-settings.html,3/4/2014,Cross-site Request Forgery (CSRF),Insufficient Process Validation,DNS Hijacking,Technology,,,,,,,,,,
-2014-052,"WHID 2014-052: Attack campaign compromises 300,000 home routers, alters DNS settings","A group of attackers managed to compromise 300,000 home and small-office wireless routers, altering their settings to use rogue DNS servers, according to Internet security research organization Team Cymru.",http://www.pcworld.com/article/2104380/attack-campaign-compromises-300000-home-routers-alters-dns-settings.html,3/4/2014,Cross-site Request Forgery (CSRF),Insufficient Process Validation,DNS Hijacking,Technology,,,,,,,,,,
-2014-053,WHID 2014-053: Man charged with using SQL injection to access Federal Reserve data,"According to the indictment, Love used SQL injection to take advantage of a vulnerability in software used by certain servers belonging to the Federal Reserve, which allowed him to gain unauthorized access.",http://www.scmagazine.com/man-charged-with-using-sql-injection-to-access-federal-reserve-data/article/336228/,2/28/2014,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2014-053,WHID 2014-053: Man charged with using SQL injection to access Federal Reserve data,"According to the indictment, Love used SQL injection to take advantage of a vulnerability in software used by certain servers belonging to the Federal Reserve, which allowed him to gain unauthorized access.",http://www.scmagazine.com/man-charged-with-using-sql-injection-to-access-federal-reserve-data/article/336228/,2/28/2014,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2014-054,WHID 2014-054: Sudan Tribune Website Hacked,Sudan Tribune would like to clarify that a fake report published on Tuesday stating that former South Sudan vice-president and leader of the SPLM in Opposition Riek Machar was assassinated was a result to the site being hacked apparently in an April Fool's Day prank done in an extremely poor taste,http://allafrica.com/stories/201404020362.html,2/4/2014,Unknown,Unknown,Disinformation,Media,,,,,,,,,,
-2014-054,WHID 2014-054: Sudan Tribune Website Hacked,Sudan Tribune would like to clarify that a fake report published on Tuesday stating that former South Sudan vice-president and leader of the SPLM in Opposition Riek Machar was assassinated was a result to the site being hacked apparently in an April Fool's Day prank done in an extremely poor taste,http://allafrica.com/stories/201404020362.html,2/4/2014,Unknown,Unknown,Disinformation,Media,,,,,,,,,,
-2014-055,WHID 2014-055: Anonymous DDoS attack dismantles Albuquerque Police website,The hacktivist collective Anonymous organized a distributed denial-of-service (DDoS) attack this weekend that made good on the group's promise to shut down the Albuquerque Police Department's website.,http://www.scmagazine.com/anonymous-ddos-attack-dismantles-albuquerque-police-website/article/340805/,4/1/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Law Enforcement,,,,,,,,,,
-2014-055,WHID 2014-055: Anonymous DDoS attack dismantles Albuquerque Police website,The hacktivist collective Anonymous organized a distributed denial-of-service (DDoS) attack this weekend that made good on the group's promise to shut down the Albuquerque Police Department's website.,http://www.scmagazine.com/anonymous-ddos-attack-dismantles-albuquerque-police-website/article/340805/,4/1/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Law Enforcement,,,,,,,,,,
-2014-056,WHID 2014-056: Attacker Holds Email Service Mad Mimi for Bitcoin Ransom,"Email marketing service Mad Mimi was hit with a denial of service attack this past weekend. Soon after the attack, the email provider received an email from someone asking or rather holding Mad Mimi ransom for 1.8 bitcoins in order to stop launching attacks on them.",https://coinreport.net/mad-mimi-bitcoin-ransom/,4/1/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Service Provider,,,,,,,,,,
-2014-056,WHID 2014-056: Attacker Holds Email Service Mad Mimi for Bitcoin Ransom,"Email marketing service Mad Mimi was hit with a denial of service attack this past weekend. Soon after the attack, the email provider received an email from someone asking or rather holding Mad Mimi ransom for 1.8 bitcoins in order to stop launching attacks on them.",https://coinreport.net/mad-mimi-bitcoin-ransom/,4/1/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Service Provider,,,,,,,,,,
-2014-057,"WHID 2014-057: DDOS Attacks Buckle Blizzard Servers for Diablo III, Hearthstone & More","Blizzard has announced that EU servers for World of Warcraft, StarCraft II, Hearthstone and Diablo III might be impacted by high latency and disconnections due to DDoS attacks.",http://www.escapistmagazine.com/news/view/133402-DDOS-Attacks-Buckle-Blizzard-Servers-for-Diablo-III-Hearthstone-More,4/1/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Entertainment,,,,,,,,,,
-2014-057,"WHID 2014-057: DDOS Attacks Buckle Blizzard Servers for Diablo III, Hearthstone & More","Blizzard has announced that EU servers for World of Warcraft, StarCraft II, Hearthstone and Diablo III might be impacted by high latency and disconnections due to DDoS attacks.",http://www.escapistmagazine.com/news/view/133402-DDOS-Attacks-Buckle-Blizzard-Servers-for-Diablo-III-Hearthstone-More,4/1/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Entertainment,,,,,,,,,,
-2014-058,WHID 2014-058: University of Wisconsin Hacked,"The University of Wisconsin-Parkside recently began notifying approximately 15,000 students that their personal information may have been exposed after hackers installed malware on a university server",http://www.esecurityplanet.com/print/hackers/university-of-wisconsin-hacked.html,3/28/2014,Unknown,Unknown,Leakage of Information,Education,,,,,,,,,,
-2014-058,WHID 2014-058: University of Wisconsin Hacked,"The University of Wisconsin-Parkside recently began notifying approximately 15,000 students that their personal information may have been exposed after hackers installed malware on a university server",http://www.esecurityplanet.com/print/hackers/university-of-wisconsin-hacked.html,3/28/2014,Unknown,Unknown,Leakage of Information,Education,,,,,,,,,,
-2014-059,WHID 2014-059: Researchers Uncover Interesting Browser-Based Botnet,Security researchers discovered an odd DDoS attack against several sites recently that relied on a persistent cross-site scripting vulnerability in a major video Web site and hijacked users? browsers in order to flood the site with traffic.,http://threatpost.com/researchers-uncover-interesting-browser-based-botnet/105250,4/4/2014,Cross-site Scripting (XSS),Improper Output Handling,Planting of Malware,Media,,,,,,,,,,
-2014-059,WHID 2014-059: Researchers Uncover Interesting Browser-Based Botnet,Security researchers discovered an odd DDoS attack against several sites recently that relied on a persistent cross-site scripting vulnerability in a major video Web site and hijacked users? browsers in order to flood the site with traffic.,http://threatpost.com/researchers-uncover-interesting-browser-based-botnet/105250,4/4/2014,Cross-site Scripting (XSS),Improper Output Handling,Planting of Malware,Media,,,,,,,,,,
-2014-060,WHID 2014-060: HootSuite Back Online After Denial of Service Attacks,"Social media management system Hootsuite recovered rapidly from a denial of service (DoS) attack late last week, bouncing back after being offline for a few hours Thursday morning.",https://threatpost.com/hootsuite-back-online-following-denial-of-service-attack/104975,3/24/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Social,,,,,,,,,,
-2014-060,WHID 2014-060: HootSuite Back Online After Denial of Service Attacks,"Social media management system Hootsuite recovered rapidly from a denial of service (DoS) attack late last week, bouncing back after being offline for a few hours Thursday morning.",https://threatpost.com/hootsuite-back-online-following-denial-of-service-attack/104975,3/24/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Social,,,,,,,,,,
-2014-061,WHID 2014-061: Credit Card Breach at California DMV,"The California Department of Motor Vehicles appears to have suffered a wide-ranging credit card data breach involving online payments for DMV-related services, according to banks in California and elsewhere that received alerts this week about compromised cards that all had been previously used online at the California DMV.",http://krebsonsecurity.com/2014/03/sources-credit-card-breach-at-california-dmv/,3/14/2014,Unknown,Unknown,Leakage of Information,Government,,,,,,,,,,
-2014-061,WHID 2014-061: Credit Card Breach at California DMV,"The California Department of Motor Vehicles appears to have suffered a wide-ranging credit card data breach involving online payments for DMV-related services, according to banks in California and elsewhere that received alerts this week about compromised cards that all had been previously used online at the California DMV.",http://krebsonsecurity.com/2014/03/sources-credit-card-breach-at-california-dmv/,3/14/2014,Unknown,Unknown,Leakage of Information,Government,,,,,,,,,,
-2014-062,WHID 2014-062: Basecamp Held Hostage by Hackers,It looks like hackers have hit Basecamp with a distributed denial-of-service (DDoS) attack and are demanding that the company pay a ransom.,http://www.nbcnews.com/tech/security/basecamp-held-hostage-hackers-n60621,3/24/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Technology,,,,,,,,,,
-2014-062,WHID 2014-062: Basecamp Held Hostage by Hackers,It looks like hackers have hit Basecamp with a distributed denial-of-service (DDoS) attack and are demanding that the company pay a ransom.,http://www.nbcnews.com/tech/security/basecamp-held-hostage-hackers-n60621,3/24/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Technology,,,,,,,,,,
-2014-063,WHID 2014-063: Russian Foreign Ministry website suffers new hacker attack,"The Russian Foreign Ministry's website suffered yet another hacker attack on Saturday. By now, access to the website has been restored and steps are being taken to modernize its security.",http://voiceofrussia.com/news/2014_03_23/Russian-Foreign-Ministry-website-suffers-new-hacker-attack-source-9194/,3/24/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,,,,,,,,
-2014-063,WHID 2014-063: Russian Foreign Ministry website suffers new hacker attack,"The Russian Foreign Ministry's website suffered yet another hacker attack on Saturday. By now, access to the website has been restored and steps are being taken to modernize its security.",http://voiceofrussia.com/news/2014_03_23/Russian-Foreign-Ministry-website-suffers-new-hacker-attack-source-9194/,3/24/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,,,,,,,,
-2014-064,WHID 2014-064: Australian Police Investigating Teen Who Found Database Flaw,"Joshua Rogers, 16, of Melbourne, found a SQL injection flaw in a database owned by Public Transport Victoria (PTV), which runs the state's transport system.",http://www.cio.com/article/2379712/data-protection/australian-police-investigating-teen-who-found-database-flaw.html,1/10/2014,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2014-064,WHID 2014-064: Australian Police Investigating Teen Who Found Database Flaw,"Joshua Rogers, 16, of Melbourne, found a SQL injection flaw in a database owned by Public Transport Victoria (PTV), which runs the state's transport system.",http://www.cio.com/article/2379712/data-protection/australian-police-investigating-teen-who-found-database-flaw.html,1/10/2014,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2014-065,"WHID 2014-065: Md. man admits taking over YouTube channels for ad money, hacking into AOL CEO?s e-mail","According to his plea, he and another man ? who court records show is scheduled to plead in the case next week ? exploited Google?s password-reset process to get into unwitting users? accounts, which they then used to take over those users? YouTube channels.",http://www.washingtonpost.com/local/crime/md-man-admits-taking-over-youtube-channels-for-ad-money-hacking-into-aol-ceos-e-mail/2014/01/09/f352ac3e-7970-11e3-b1c5-739e63e9c9a7_story.html,1/9/2014,Brute Force,Insufficient Anti-Automation,Account Takeover,Service Provider,,,,,,,,,,
-2014-065,"WHID 2014-065: Md. man admits taking over YouTube channels for ad money, hacking into AOL CEO?s e-mail","According to his plea, he and another man ? who court records show is scheduled to plead in the case next week ? exploited Google?s password-reset process to get into unwitting users? accounts, which they then used to take over those users? YouTube channels.",http://www.washingtonpost.com/local/crime/md-man-admits-taking-over-youtube-channels-for-ad-money-hacking-into-aol-ceos-e-mail/2014/01/09/f352ac3e-7970-11e3-b1c5-739e63e9c9a7_story.html,1/9/2014,Brute Force,Insufficient Anti-Automation,Account Takeover,Service Provider,,,,,,,,,,
-2014-066,WHID 2014-066: MIT website hacked by Anonymous on anniversary of Aaron Swartz suicide,"Late on January 10, the hacktivism entity Anonymous hacked and defaced MIT letting the institution know Anonymous will not forget the tragic suicide of hacker Aaron Swartz.",http://www.zdnet.com/mit-website-hacked-by-anonymous-on-anniversary-of-aaron-swartz-suicide-7000025041/,1/10/2014,Unknown,Unknown,Defacement,Education,,,,,,,,,,
-2014-066,WHID 2014-066: MIT website hacked by Anonymous on anniversary of Aaron Swartz suicide,"Late on January 10, the hacktivism entity Anonymous hacked and defaced MIT letting the institution know Anonymous will not forget the tragic suicide of hacker Aaron Swartz.",http://www.zdnet.com/mit-website-hacked-by-anonymous-on-anniversary-of-aaron-swartz-suicide-7000025041/,1/10/2014,Unknown,Unknown,Defacement,Education,,,,,,,,,,
-2014-067,"WHID 2014-067: Dropbox hits by DDoS, but user data safe; The 1775 Sec claims responsibility",Dropbox website went offline last night with a hacking collecting calling itself The 1775 Sec claiming responsibility of the attack on the cloud storage company?s website.,http://www.techienews.co.uk/974664/dropbox-hits-ddos-user-data-safe-1775-sec-claims-responsibility/,1/11/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Technology,,,,,,,,,,
-2014-067,"WHID 2014-067: Dropbox hits by DDoS, but user data safe; The 1775 Sec claims responsibility",Dropbox website went offline last night with a hacking collecting calling itself The 1775 Sec claiming responsibility of the attack on the cloud storage company?s website.,http://www.techienews.co.uk/974664/dropbox-hits-ddos-user-data-safe-1775-sec-claims-responsibility/,1/11/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Technology,,,,,,,,,,
-2014-068,WHID 2014-068: Microsoft's Twitter account Hacked,"In an apparent hacking of the Microsoft News Twitter account, a tweet emerges saying the company sells customer data to the government. The Syrian Electronic Army claims responsibility.",http://www.cnet.com/news/microsofts-twitter-account-dont-use-our-e-mail/,1/11/2014,Unknown,Unknown,Account Takeover,Social,,,,,,,,,,
-2014-068,WHID 2014-068: Microsoft's Twitter account Hacked,"In an apparent hacking of the Microsoft News Twitter account, a tweet emerges saying the company sells customer data to the government. The Syrian Electronic Army claims responsibility.",http://www.cnet.com/news/microsofts-twitter-account-dont-use-our-e-mail/,1/11/2014,Unknown,Unknown,Account Takeover,Social,,,,,,,,,,
-2014-069,WHID 2014-069: City of Sheboygan website hacked,"SheboyganDaily.com accessed several pages on the city?s website at www.ci.sheboygan.wi.us Sunday afternoon and discovered links, forms and applications are redirecting to drug websites.",http://www.sheboygandaily.com/2014/01/12/city-of-sheboygan-website-hacked/,1/12/2014,Unknown,Improper Output Handling,SPAM Links,Government,,,,,,,,,,
-2014-069,WHID 2014-069: City of Sheboygan website hacked,"SheboyganDaily.com accessed several pages on the city?s website at www.ci.sheboygan.wi.us Sunday afternoon and discovered links, forms and applications are redirecting to drug websites.",http://www.sheboygandaily.com/2014/01/12/city-of-sheboygan-website-hacked/,1/12/2014,Unknown,Improper Output Handling,SPAM Links,Government,,,,,,,,,,
-2014-070,WHID 2014-070: Microsoft's official blog hacked by Syrian Electronic Army,"Microsoft's official blog, along with email and social network handles, have been hacked by the Syrian Electronic Army (SEA), with the group warning that they will publish ""the documents of monitoring email accounts by Microsoft"".",http://www.techradar.com/news/world-of-tech/microsoft-s-official-blog-hacked-by-syrian-electronic-army-1214677,1/12/2014,Unknown,Unknown,Disinformation,Technology,,,,,,,,,,
-2014-070,WHID 2014-070: Microsoft's official blog hacked by Syrian Electronic Army,"Microsoft's official blog, along with email and social network handles, have been hacked by the Syrian Electronic Army (SEA), with the group warning that they will publish ""the documents of monitoring email accounts by Microsoft"".",http://www.techradar.com/news/world-of-tech/microsoft-s-official-blog-hacked-by-syrian-electronic-army-1214677,1/12/2014,Unknown,Unknown,Disinformation,Technology,,,,,,,,,,
-2014-071,WHID 2014-071: Anonymous Hackers Target Website of the Archbishop of Granada,"The official website of the Archbishop of Granada, Spain, has been breached by hackers of Anonymous. Satirical messages and even adult images have been posted in various sections of the site.",http://news.softpedia.com/news/Anonymous-Hackers-Target-Website-of-the-Archbishop-of-Granada-416622.shtml,1/14/2014,Unknown,Unknown,Defacement,Religious,,,,,,,,,,
-2014-071,WHID 2014-071: Anonymous Hackers Target Website of the Archbishop of Granada,"The official website of the Archbishop of Granada, Spain, has been breached by hackers of Anonymous. Satirical messages and even adult images have been posted in various sections of the site.",http://news.softpedia.com/news/Anonymous-Hackers-Target-Website-of-the-Archbishop-of-Granada-416622.shtml,1/14/2014,Unknown,Unknown,Defacement,Religious,,,,,,,,,,
-2014-072,WHID 2014-072: Hackers Used Amazon's Cloud To Scrape LinkedIn User Data,"Hackers have been using Amazon?s powerful data center computers to scrape data from thousands of LinkedIn accounts in order to create fake profiles on the site, according to a new complaint the company has filed in the U.S. district court of Northern California.",http://www.businessinsider.com.au/linkedin-suing-to-get-hacker-identities-2014-1,1/16/2014,Scraping,Insufficient Anti-Automation,Disinformation,Social,,,,,,,,,,
-2014-072,WHID 2014-072: Hackers Used Amazon's Cloud To Scrape LinkedIn User Data,"Hackers have been using Amazon?s powerful data center computers to scrape data from thousands of LinkedIn accounts in order to create fake profiles on the site, according to a new complaint the company has filed in the U.S. district court of Northern California.",http://www.businessinsider.com.au/linkedin-suing-to-get-hacker-identities-2014-1,1/16/2014,Scraping,Insufficient Anti-Automation,Disinformation,Social,,,,,,,,,,
-2014-073,WHID 2014-073: Saudi Arabian Government?s Informatics Magazine Hacked by Syrian Hacktivist,A Syrian hacktivist who uses the online moniker Dr.Sha6h has breached and defaced the website of Saudi Arabia?s Informatics Magazine (informatics.gov.sa).,http://news.softpedia.com/news/Saudi-Arabian-Government-s-Informatics-Magazine-Hacked-by-Syrian-Hacktivist-417491.shtml,1/16/2014,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2014-073,WHID 2014-073: Saudi Arabian Government?s Informatics Magazine Hacked by Syrian Hacktivist,A Syrian hacktivist who uses the online moniker Dr.Sha6h has breached and defaced the website of Saudi Arabia?s Informatics Magazine (informatics.gov.sa).,http://news.softpedia.com/news/Saudi-Arabian-Government-s-Informatics-Magazine-Hacked-by-Syrian-Hacktivist-417491.shtml,1/16/2014,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2014-074,WHID 2014-074: AVG Confirms One of Its Webservers Was Hacked and Defaced,AVG has confirmed that one of its webservers was recently breached by hackers. The IT security company is investigating the incident.,http://news.softpedia.com/news/AVG-Confirms-One-of-Its-Webservers-Was-Hacked-and-Defaced-417781.shtml,1/16/2014,Unknown,Unknown,Defacement,Technology,,,,,,,,,,
-2014-074,WHID 2014-074: AVG Confirms One of Its Webservers Was Hacked and Defaced,AVG has confirmed that one of its webservers was recently breached by hackers. The IT security company is investigating the incident.,http://news.softpedia.com/news/AVG-Confirms-One-of-Its-Webservers-Was-Hacked-and-Defaced-417781.shtml,1/16/2014,Unknown,Unknown,Defacement,Technology,,,,,,,,,,
-2014-075,WHID 2014-075: EE BrightBox routers can be hacked 'by simple copy/paste operation',"A cache of sensitive traffic including ISP user credentials, WiFi SSIDs and WPA2 keys is kept in a file called cgi_status.js that can be accessed without logging into the device.",http://www.theregister.co.uk/2014/01/20/brightbox_routers_vuln/,1/20/2014,Predictable Resource Location,Insufficient Authentication,Leakage of Information,Technology,,,,,,,,,,
-2014-075,WHID 2014-075: EE BrightBox routers can be hacked 'by simple copy/paste operation',"A cache of sensitive traffic including ISP user credentials, WiFi SSIDs and WPA2 keys is kept in a file called cgi_status.js that can be accessed without logging into the device.",http://www.theregister.co.uk/2014/01/20/brightbox_routers_vuln/,1/20/2014,Predictable Resource Location,Insufficient Authentication,Leakage of Information,Technology,,,,,,,,,,
-2014-076,"WHID 2014-076: Insecure healthcare.gov allowed hacker to access 70,000 records in 4 minutes","Then yesterday, after explaining ?passive reconnaissance, which allows us to query and look at how the website operates and performs,? Kennedy said he was able to access 70,000 records within four minutes!",http://blogs.computerworld.com/cybercrime-and-hacking/23412/insecure-healthcaregov-allowed-hacker-access-70000-records-4-minutes,1/20/2014,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2014-076,"WHID 2014-076: Insecure healthcare.gov allowed hacker to access 70,000 records in 4 minutes","Then yesterday, after explaining ?passive reconnaissance, which allows us to query and look at how the website operates and performs,? Kennedy said he was able to access 70,000 records within four minutes!",http://blogs.computerworld.com/cybercrime-and-hacking/23412/insecure-healthcaregov-allowed-hacker-access-70000-records-4-minutes,1/20/2014,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2014-077,WHID 2014-077: Bell Canada Hacked by NullCrew,"The hackers, however, told DataBreaches.net that they had leveraged a SQL injection vulnerability on Bell's own Web site, not at a third-party supplier, to access the information.",http://www.esecurityplanet.com/hackers/bell-canada-hacked-by-nullcrew.html,2/4/2014,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,,,,,,,,,
-2014-077,WHID 2014-077: Bell Canada Hacked by NullCrew,"The hackers, however, told DataBreaches.net that they had leveraged a SQL injection vulnerability on Bell's own Web site, not at a third-party supplier, to access the information.",http://www.esecurityplanet.com/hackers/bell-canada-hacked-by-nullcrew.html,2/4/2014,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,,,,,,,,,
-2014-078,WHID 2014-078: Banks face ?significant? DDoS threat as cyber criminals target share prices,"Financial institutions face a ?significant? and growing cyber threat, as hacktivists and criminals attempt to manipulate markets with distributed denial of service attacks, according to a report.",http://www.computerworlduk.com/news/security/3500580/banks-face-significant-ddos-threat-as-cyber-criminals-target-share-prices/,2/5/2014,Denial of Service,Insufficient Anti-Automation,Monetary Loss,Finance,,,,,,,,,,
-2014-078,WHID 2014-078: Banks face ?significant? DDoS threat as cyber criminals target share prices,"Financial institutions face a ?significant? and growing cyber threat, as hacktivists and criminals attempt to manipulate markets with distributed denial of service attacks, according to a report.",http://www.computerworlduk.com/news/security/3500580/banks-face-significant-ddos-threat-as-cyber-criminals-target-share-prices/,2/5/2014,Denial of Service,Insufficient Anti-Automation,Monetary Loss,Finance,,,,,,,,,,
-2014-079,WHID 2014-079: Bitly hit by DDoS attack,The website of URL shortening service Bitly was down on Wednesday morning.The company has blamed a DDoS attack.,http://www.scmagazineuk.com/exclusive-bitly-hit-by-ddos-attack/article/332738/,2/5/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Technology,,,,,,,,,,
-2014-079,WHID 2014-079: Bitly hit by DDoS attack,The website of URL shortening service Bitly was down on Wednesday morning.The company has blamed a DDoS attack.,http://www.scmagazineuk.com/exclusive-bitly-hit-by-ddos-attack/article/332738/,2/5/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Technology,,,,,,,,,,
-2014-080,"WHID 2014-080: NullCrew FTS hacks Comcast servers, post exploit and passwords","Hacking group ""NullCrew FTS"" announced on Twitter today that they had successfully hacked Comcast and provided unredacted proof on Pastebin.",http://www.zdnet.com/nullcrew-fts-hacks-comcast-servers-post-exploit-and-passwords-7000026020/,2/5/2014,Local File Inclusion (LFI),Improper Input Handling,Leakage of Information,Service Provider,,,,,,,,,,
-2014-080,"WHID 2014-080: NullCrew FTS hacks Comcast servers, post exploit and passwords","Hacking group ""NullCrew FTS"" announced on Twitter today that they had successfully hacked Comcast and provided unredacted proof on Pastebin.",http://www.zdnet.com/nullcrew-fts-hacks-comcast-servers-post-exploit-and-passwords-7000026020/,2/5/2014,Local File Inclusion (LFI),Improper Input Handling,Leakage of Information,Service Provider,,,,,,,,,,
-2014-081,WHID 2014-081: Feds' Climate Change Website Hacked By Online Drug Seller,"The website of the U.S. Global Change Research Program (USGCRP) was repeatedly hacked on Monday and Tuesday this week by an online drug retailer. A Tuesday Google search of the site, www.globalchange.gov, revealed dozens of pages hawking everything from Xanax to Levitra to Ambien.",http://www.weeklystandard.com/blogs/feds-climate-change-website-hacked-online-drug-seller_781491.html,2/12/2014,Unknown,Unknown,SPAM Links,Government,,,,,,,,,,
-2014-081,WHID 2014-081: Feds' Climate Change Website Hacked By Online Drug Seller,"The website of the U.S. Global Change Research Program (USGCRP) was repeatedly hacked on Monday and Tuesday this week by an online drug retailer. A Tuesday Google search of the site, www.globalchange.gov, revealed dozens of pages hawking everything from Xanax to Levitra to Ambien.",http://www.weeklystandard.com/blogs/feds-climate-change-website-hacked-online-drug-seller_781491.html,2/12/2014,Unknown,Unknown,SPAM Links,Government,,,,,,,,,,
-2014-082,"WHID 2014-082: Hackers breach websites of Venetian, Palazzo and other casinos in Las Vegas","Hackers breached the websites of all Las Vegas Sands Corp. casinos on Tuesday morning, and the home pages of some of the world's largest casinos remained down through the day.",http://gadgets.ndtv.com/internet/news/hackers-breach-websites-of-venetian-palazzo-and-other-casinos-in-las-vegas-482455,2/12/2014,Unknown,Unknown,Defacement,Gaming,,,,,,,,,,
-2014-082,"WHID 2014-082: Hackers breach websites of Venetian, Palazzo and other casinos in Las Vegas","Hackers breached the websites of all Las Vegas Sands Corp. casinos on Tuesday morning, and the home pages of some of the world's largest casinos remained down through the day.",http://gadgets.ndtv.com/internet/news/hackers-breach-websites-of-venetian-palazzo-and-other-casinos-in-las-vegas-482455,2/12/2014,Unknown,Unknown,Defacement,Gaming,,,,,,,,,,
-2014-083,WHID 2014-083: Ministry website forced offline,A Government department's website was taken offline by a cyber attack which bombarded it with access requests.,http://www.belfasttelegraph.co.uk/news/local-national/uk/ministry-website-forced-offline-30003368.html,2/12/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,,,,,,,,
-2014-083,WHID 2014-083: Ministry website forced offline,A Government department's website was taken offline by a cyber attack which bombarded it with access requests.,http://www.belfasttelegraph.co.uk/news/local-national/uk/ministry-website-forced-offline-30003368.html,2/12/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,,,,,,,,
-2014-084,WHID 2014-084: GCHQ website falls after threats from Anonymous,"GCHQ's website at www.gchq.gov.uk is exhibiting some noticeable performance issues today, suggesting that it could be suffering from a denial of service attack.",http://news.netcraft.com/archives/2014/02/12/gchq-website-falls-after-threats-from-anonymous.html,2/12/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,,,,,,,,
-2014-084,WHID 2014-084: GCHQ website falls after threats from Anonymous,"GCHQ's website at www.gchq.gov.uk is exhibiting some noticeable performance issues today, suggesting that it could be suffering from a denial of service attack.",http://news.netcraft.com/archives/2014/02/12/gchq-website-falls-after-threats-from-anonymous.html,2/12/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,,,,,,,,
-2014-085,"WHID 2014-085: Briefly Hacked, Quickly Eradicated","At the start of this work week Blue MauMau was briefly hacked by a spambot lodged in third-party service software. It tried to use our server to inject spam out to the world. That sparked Google to mark our site for a few hours on Monday with the message, ""The website ahead contains malware!""",http://www.bluemaumau.org/briefly_hacked_quickly_eradicated,2/14/2014,Unknown,Unknown,Planting of Malware,Media,,,,,,,,,,
-2014-085,"WHID 2014-085: Briefly Hacked, Quickly Eradicated","At the start of this work week Blue MauMau was briefly hacked by a spambot lodged in third-party service software. It tried to use our server to inject spam out to the world. That sparked Google to mark our site for a few hours on Monday with the message, ""The website ahead contains malware!""",http://www.bluemaumau.org/briefly_hacked_quickly_eradicated,2/14/2014,Unknown,Unknown,Planting of Malware,Media,,,,,,,,,,
-2014-086,"WHID 2014-086: Hackers hit Tesco as over 2,200 accounts compromised",The international supermarket chain deactivated its online customer accounts as hackers posted account and personal details online.,http://www.cnet.com/news/hackers-hit-tesco-as-over-2200-accounts-compromised/,2/14/2014,Brute Force,Insufficient Authentication,Account Takeover,Retail,,,,,,,,,,
-2014-086,"WHID 2014-086: Hackers hit Tesco as over 2,200 accounts compromised",The international supermarket chain deactivated its online customer accounts as hackers posted account and personal details online.,http://www.cnet.com/news/hackers-hit-tesco-as-over-2200-accounts-compromised/,2/14/2014,Brute Force,Insufficient Authentication,Account Takeover,Retail,,,,,,,,,,
-2014-087,"WHID 2014-087: Kickstarter hacked, user names and encrypted passwords accessed","The crowdfunding website Kickstarter said Saturday it had been hacked and that user names, encrypted passwords and other data had been accessed.",http://www.computerworld.com/s/article/9246388/Kickstarter_hacked_user_names_and_encrypted_passwords_accessed,2/15/2014,Unknown,Unknown,Leakage of Information,Social,,,,,,,,,,
-2014-087,"WHID 2014-087: Kickstarter hacked, user names and encrypted passwords accessed","The crowdfunding website Kickstarter said Saturday it had been hacked and that user names, encrypted passwords and other data had been accessed.",http://www.computerworld.com/s/article/9246388/Kickstarter_hacked_user_names_and_encrypted_passwords_accessed,2/15/2014,Unknown,Unknown,Leakage of Information,Social,,,,,,,,,,
-2014-088,WHID 2014-088: Forbes website hacked by notorious Syrian Electronic Army,The notorious pro-Assad hacker group known as the Syrian Electronic Army has reportedly published a database that it says contains login credentials for 1 million users of business publication Forbes.com.,http://www.business-standard.com/article/news-ani/forbes-website-hacked-by-notorious-syrian-electronic-army-114021600119_1.html,2/16/2014,Phishing,Insufficient Authentication,Disinformation,Media,,,,,,,,,,
-2014-088,WHID 2014-088: Forbes website hacked by notorious Syrian Electronic Army,The notorious pro-Assad hacker group known as the Syrian Electronic Army has reportedly published a database that it says contains login credentials for 1 million users of business publication Forbes.com.,http://www.business-standard.com/article/news-ani/forbes-website-hacked-by-notorious-syrian-electronic-army-114021600119_1.html,2/16/2014,Phishing,Insufficient Authentication,Disinformation,Media,,,,,,,,,,
-2014-089,"WHID 2014-089: University of Maryland hacked; 309,000 Social Security numbers stolen","The names and Social Security numbers of more than 309,000 students and staff from the University of Maryland, dating back to 1998, were stolen in a ""sophisticated"" security attack that penetrated recently bolstered defenses, the school?s president announced late Wednesday.",http://www.latimes.com/nation/nationnow/la-na-nn-university-of-maryland-hacked-309000-records-compromised-20140219-story.html#ixzz2trcqXKuo,2/19/2014,Unknown,Unknown,Leakage of Information,Education,,,,,,,,,,
-2014-089,"WHID 2014-089: University of Maryland hacked; 309,000 Social Security numbers stolen","The names and Social Security numbers of more than 309,000 students and staff from the University of Maryland, dating back to 1998, were stolen in a ""sophisticated"" security attack that penetrated recently bolstered defenses, the school?s president announced late Wednesday.",http://www.latimes.com/nation/nationnow/la-na-nn-university-of-maryland-hacked-309000-records-compromised-20140219-story.html#ixzz2trcqXKuo,2/19/2014,Unknown,Unknown,Leakage of Information,Education,,,,,,,,,,
-2014-090,"WHID 2014-090: Hackers breach Texas college server, thousands compromised","Texas State Technical College (TSTC) Waco is notifying almost 3,000 former students and fewer than 2,000 employees that personal information may have been compromised after an unauthorized party remotely gained access to a server that contained the data.",http://www.scmagazine.com/hackers-breach-texas-college-server-thousands-compromised/article/334663/,2/19/2014,Unknown,Unknown,Leakage of Information,Education,,,,,,,,,,
-2014-090,"WHID 2014-090: Hackers breach Texas college server, thousands compromised","Texas State Technical College (TSTC) Waco is notifying almost 3,000 former students and fewer than 2,000 employees that personal information may have been compromised after an unauthorized party remotely gained access to a server that contained the data.",http://www.scmagazine.com/hackers-breach-texas-college-server-thousands-compromised/article/334663/,2/19/2014,Unknown,Unknown,Leakage of Information,Education,,,,,,,,,,
-2014-091,WHID 2014-091: Namecheap fends off DDoS attack that knocked 300 websites offline,Namecheap said Thursday it struggled to recover from a new type of distributed denial-of-service attack (DDoS) against its DNS (domain name system) servers that knocked 300 websites offline.,http://www.pcworld.com/article/2100040/namecheap-fends-off-ddos-attack-restores-services.html,2/21/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Service Provider,,,,,,,,,,
-2014-091,WHID 2014-091: Namecheap fends off DDoS attack that knocked 300 websites offline,Namecheap said Thursday it struggled to recover from a new type of distributed denial-of-service attack (DDoS) against its DNS (domain name system) servers that knocked 300 websites offline.,http://www.pcworld.com/article/2100040/namecheap-fends-off-ddos-attack-restores-services.html,2/21/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Service Provider,,,,,,,,,,
-2014-092,"WHID 2014-092: Massive hacking spree in Singapore, possibly over 180 websites defaced","Dozens of Singapore websites, possibly more than 180, have been defaced by hackers in two separate occasions this week.",http://www.techinasia.com/massive-website-defacing-spree-singapore-possibly-180-sites-affected/,2/20/2014,Unknown,Unknown,Defacement,Hosting Providers,,,,,,,,,,
-2014-092,"WHID 2014-092: Massive hacking spree in Singapore, possibly over 180 websites defaced","Dozens of Singapore websites, possibly more than 180, have been defaced by hackers in two separate occasions this week.",http://www.techinasia.com/massive-website-defacing-spree-singapore-possibly-180-sites-affected/,2/20/2014,Unknown,Unknown,Defacement,Hosting Providers,,,,,,,,,,
-2014-093,WHID 2014-093: Systems of Austrian Energy Provider Energie Steiermark Hacked,"Energie Steiermark, an energy company in Austria?s Styria province, says that its systems have been hacked.",http://news.softpedia.com/news/Systems-of-Austrian-Energy-Provider-Energie-Steiermark-Hacked-428187.shtml,2/20/2014,Unknown,Unknown,Leakage of Information,Energy,,,,,,,,,,
-2014-093,WHID 2014-093: Systems of Austrian Energy Provider Energie Steiermark Hacked,"Energie Steiermark, an energy company in Austria?s Styria province, says that its systems have been hacked.",http://news.softpedia.com/news/Systems-of-Austrian-Energy-Provider-Energie-Steiermark-Hacked-428187.shtml,2/20/2014,Unknown,Unknown,Leakage of Information,Energy,,,,,,,,,,
-2014-094,WHID 2014-094: Hacker defaces website of IT security certification body EC-Council,"It appears the attack was the result of DNS hijacking with the domain name pointed to an Internet Protocol (IP) address under the attacker?s control. This also seems to have affected EC-Council?s email infrastructure, as attempts to contact the organization at two of its publicly listed email addresses failed with a DNS error.",http://www.pcworld.com/article/2100880/hacker-defaces-website-of-it-security-certification-body-eccouncil.html,2/24/2014,DNS Hijacking,Insufficient Process Validation,Defacement,Government,,,,,,,,,,
-2014-094,WHID 2014-094: Hacker defaces website of IT security certification body EC-Council,"It appears the attack was the result of DNS hijacking with the domain name pointed to an Internet Protocol (IP) address under the attacker?s control. This also seems to have affected EC-Council?s email infrastructure, as attempts to contact the organization at two of its publicly listed email addresses failed with a DNS error.",http://www.pcworld.com/article/2100880/hacker-defaces-website-of-it-security-certification-body-eccouncil.html,2/24/2014,DNS Hijacking,Insufficient Process Validation,Defacement,Government,,,,,,,,,,
-2014-095,"WHID 2014-095: Hackers target Carson City market, credit card info stolen",Store officials at the Carson VIllage Market confirm their local server was compromised but say proper security measures have been put in place and customers are no longer at risk,http://www.wzzm13.com/story/news/crime/2014/02/24/hackers-target-carson-city-market/5796113/,2/24/2014,Unknown,Unknown,Leakage of Information,Retail,,,,,,,,,,
-2014-095,"WHID 2014-095: Hackers target Carson City market, credit card info stolen",Store officials at the Carson VIllage Market confirm their local server was compromised but say proper security measures have been put in place and customers are no longer at risk,http://www.wzzm13.com/story/news/crime/2014/02/24/hackers-target-carson-city-market/5796113/,2/24/2014,Unknown,Unknown,Leakage of Information,Retail,,,,,,,,,,
-2014-096,WHID 2014-096: Social site Meetup hit by DDoS attack,"Social site Meetup was hit by a DDoS attack today, according to a notice on its website.",http://business-technology.co.uk/2014/02/social-site-meetup-under-ddos-attack/,2/28/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Social,,,,,,,,,,
-2014-096,WHID 2014-096: Social site Meetup hit by DDoS attack,"Social site Meetup was hit by a DDoS attack today, according to a notice on its website.",http://business-technology.co.uk/2014/02/social-site-meetup-under-ddos-attack/,2/28/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Social,,,,,,,,,,
-2014-097,WHID 2014-097: Three Alleged Hackers Arrested in Korea for Stealing Information from Hundreds of Sites,"In some cases, the attackers posted maliciously crafted code on online forums. When administrators clicked on the links, they unknowingly gave the hackers access to their systems.",http://news.softpedia.com/news/Three-Alleged-Hackers-Arrested-in-Korea-for-Stealing-Information-from-Hundreds-of-Sites-429630.shtml,2/27/2014,Cross-site Request Forgery (CSRF),Insufficient Process Validation,Leakage of Information,Retail,,,,,,,,,,
-2014-097,WHID 2014-097: Three Alleged Hackers Arrested in Korea for Stealing Information from Hundreds of Sites,"In some cases, the attackers posted maliciously crafted code on online forums. When administrators clicked on the links, they unknowingly gave the hackers access to their systems.",http://news.softpedia.com/news/Three-Alleged-Hackers-Arrested-in-Korea-for-Stealing-Information-from-Hundreds-of-Sites-429630.shtml,2/27/2014,Cross-site Request Forgery (CSRF),Insufficient Process Validation,Leakage of Information,Retail,,,,,,,,,,
-2014-098,WHID 2014-098: Revealed: key UK websites vulnerable to hackers,"The official website of the UK Parliament contained basic flaws that left it vulnerable to hacking, a programmer has discovered.",http://www.telegraph.co.uk/technology/internet-security/10673520/Revealed-key-UK-websites-vulnerable-to-hackers.html,3/4/2014,Cross-site Scripting (XSS),Improper Output Handling,Disinformation,Government,,,,,,,,,,
-2014-098,WHID 2014-098: Revealed: key UK websites vulnerable to hackers,"The official website of the UK Parliament contained basic flaws that left it vulnerable to hacking, a programmer has discovered.",http://www.telegraph.co.uk/technology/internet-security/10673520/Revealed-key-UK-websites-vulnerable-to-hackers.html,3/4/2014,Cross-site Scripting (XSS),Improper Output Handling,Disinformation,Government,,,,,,,,,,
-2014-099,WHID 2014-099: XSS flaw in popular video-sharing site allowed DDoS attack through browsers,"Attackers exploited a vulnerability in a popular video-sharing site to hijack users' browsers for use in a large-scale distributed denial-of-service attack, according to researchers from Web security firm Incapsula.",http://www.computerworld.com/s/article/9247450/XSS_flaw_in_popular_video_sharing_site_allowed_DDoS_attack_through_browsers,4/4/2014,Cross-site Scripting (XSS),Improper Output Handling,DDoS Attacks,Social,,,,,,,,,,
-2014-099,WHID 2014-099: XSS flaw in popular video-sharing site allowed DDoS attack through browsers,"Attackers exploited a vulnerability in a popular video-sharing site to hijack users' browsers for use in a large-scale distributed denial-of-service attack, according to researchers from Web security firm Incapsula.",http://www.computerworld.com/s/article/9247450/XSS_flaw_in_popular_video_sharing_site_allowed_DDoS_attack_through_browsers,4/4/2014,Cross-site Scripting (XSS),Improper Output Handling,DDoS Attacks,Social,,,,,,,,,,
-2014-100,WHID 2014-100: Ellie Mae hit by DDoS attack,Mortgage origination software provider Ellie Mae says that a distributed denial of service (DDoS) attack is to blame for its systems falling over earlier this week.,http://www.finextra.com/news/fullstory.aspx?newsitemid=25930&topic=security,4/4/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,,,,,,,,
-2014-100,WHID 2014-100: Ellie Mae hit by DDoS attack,Mortgage origination software provider Ellie Mae says that a distributed denial of service (DDoS) attack is to blame for its systems falling over earlier this week.,http://www.finextra.com/news/fullstory.aspx?newsitemid=25930&topic=security,4/4/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,,,,,,,,
-2014-101,WHID 2014-101: Denial of Service Attacks on GitHub,"On Tuesday, March 11th, GitHub was largely unreachable for roughly 2 hours as the result of an evolving distributed denial of service (DDoS) attack. I know that you rely on GitHub to be available all the time, and I'm sorry we let you down. I'd like to explain what happened, how we responded to it, and what we're doing to reduce the impact of future attacks like this.",https://github.com/blog/1796-denial-of-service-attacks,3/14/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Technology,,,,,,,,,,
-2014-101,WHID 2014-101: Denial of Service Attacks on GitHub,"On Tuesday, March 11th, GitHub was largely unreachable for roughly 2 hours as the result of an evolving distributed denial of service (DDoS) attack. I know that you rely on GitHub to be available all the time, and I'm sorry we let you down. I'd like to explain what happened, how we responded to it, and what we're doing to reduce the impact of future attacks like this.",https://github.com/blog/1796-denial-of-service-attacks,3/14/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Technology,,,,,,,,,,
-2014-102,"WHID 2014-102: More Than 162,000 WordPress Sites Used for Distributed Denial of Service Attack","Distributed Denial of Service (DDOS) attacks are becoming a common trend on our blog lately, and that?s OK because it?s a very serious issue for every website owner. Today I want to talk about a large DDOS attack that leveraged thousands of unsuspecting WordPress websites as indirect source amplification vectors",http://blog.sucuri.net/2014/03/more-than-162000-wordpress-sites-used-for-distributed-denial-of-service-attack.html,3/10/2014,Denial of Service,Insufficient Process Validation,Downtime,Blogs,,,,,,,,,,
-2014-102,"WHID 2014-102: More Than 162,000 WordPress Sites Used for Distributed Denial of Service Attack","Distributed Denial of Service (DDOS) attacks are becoming a common trend on our blog lately, and that?s OK because it?s a very serious issue for every website owner. Today I want to talk about a large DDOS attack that leveraged thousands of unsuspecting WordPress websites as indirect source amplification vectors",http://blog.sucuri.net/2014/03/more-than-162000-wordpress-sites-used-for-distributed-denial-of-service-attack.html,3/10/2014,Denial of Service,Insufficient Process Validation,Downtime,Blogs,,,,,,,,,,
-2014-103,WHID 2014-103: Basecamp Becomes Latest Victim Of DDoS Attackers Attempting To Extort Money From Tech Companies,"Basecamp, makers of the popular online project management software of the same name (which as of this February became the company?s main focus) was hit with a distributed denial-of-service attack (DDoS) this morning, rendering its services temporarily unavailable. The company disclosed this news in a blog post, explaining that the ?criminals? behind the DDoS had also tried to extort money in return for stopping the attack ? a request that Basecamp smartly refused.",http://techcrunch.com/2014/03/24/basecamp-becomes-latest-victim-of-ddos-attackers-attempting-to-extort-money-from-tech-companies/,3/24/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Technology,,,,,,,,,,
-2014-103,WHID 2014-103: Basecamp Becomes Latest Victim Of DDoS Attackers Attempting To Extort Money From Tech Companies,"Basecamp, makers of the popular online project management software of the same name (which as of this February became the company?s main focus) was hit with a distributed denial-of-service attack (DDoS) this morning, rendering its services temporarily unavailable. The company disclosed this news in a blog post, explaining that the ?criminals? behind the DDoS had also tried to extort money in return for stopping the attack ? a request that Basecamp smartly refused.",http://techcrunch.com/2014/03/24/basecamp-becomes-latest-victim-of-ddos-attackers-attempting-to-extort-money-from-tech-companies/,3/24/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Technology,,,,,,,,,,
-2014-104,WHID 2014-104: Russian media websites hit by ?massive? DDoS attack ?linked to Ukraine?,"Websites of several Russian state TV channels have been hit by a large cyberattack suspected to partly come from Kiev. Anonymous Caucasus claimed it was responsible for hacking Channel One TV?s site, saying it had ?nothing? to do with Ukraine.",http://rt.com/news/russian-media-ddos-ukraine-614/,3/14/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Media,,,,,,,,,,
-2014-104,WHID 2014-104: Russian media websites hit by ?massive? DDoS attack ?linked to Ukraine?,"Websites of several Russian state TV channels have been hit by a large cyberattack suspected to partly come from Kiev. Anonymous Caucasus claimed it was responsible for hacking Channel One TV?s site, saying it had ?nothing? to do with Ukraine.",http://rt.com/news/russian-media-ddos-ukraine-614/,3/14/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Media,,,,,,,,,,
-2014-105,"WHID 2014-105: DDoS attack takes out NATO websites, Ukraine connection claimed",A series of DDoS attacks launched over the weekend disrupted access to several websites operated by NATO,http://nakedsecurity.sophos.com/2014/03/17/ddos-attack-takes-out-nato-websites-ukraine-connection-claimed/,3/17/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,,,,,,,,
-2014-105,"WHID 2014-105: DDoS attack takes out NATO websites, Ukraine connection claimed",A series of DDoS attacks launched over the weekend disrupted access to several websites operated by NATO,http://nakedsecurity.sophos.com/2014/03/17/ddos-attack-takes-out-nato-websites-ukraine-connection-claimed/,3/17/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,,,,,,,,
-2014-106,WHID 2014-106: HootSuite Bounces Back After DDoS Attack,HootSuite has bounced back from a denial of service (DoS) attack on Thursday morning that prevented users from accessing the social media platform.,http://mashable.com/2014/03/21/hootsuite-bounce-back-after-ddos-attack/,3/21/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Social,,,,,,,,,,
-2014-106,WHID 2014-106: HootSuite Bounces Back After DDoS Attack,HootSuite has bounced back from a denial of service (DoS) attack on Thursday morning that prevented users from accessing the social media platform.,http://mashable.com/2014/03/21/hootsuite-bounce-back-after-ddos-attack/,3/21/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Social,,,,,,,,,,
-2014-107,"WHID 2014-107: Elance and oDesk hit by major DDoS attacks, downing services for many freelancers","The Elance denial-of-service attack has been going on for over a day now, though it is now only sporadic. Elance says it has bought in new defences to try cope. Meanwhile oDesk says it got hit by a briefer, separate attack.",http://gigaom.com/2014/03/18/elance-hit-by-major-ddos-attack-downing-service-for-many-freelancers/,3/18/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Technology,,,,,,,,,,
-2014-107,"WHID 2014-107: Elance and oDesk hit by major DDoS attacks, downing services for many freelancers","The Elance denial-of-service attack has been going on for over a day now, though it is now only sporadic. Elance says it has bought in new defences to try cope. Meanwhile oDesk says it got hit by a briefer, separate attack.",http://gigaom.com/2014/03/18/elance-hit-by-major-ddos-attack-downing-service-for-many-freelancers/,3/18/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Technology,,,,,,,,,,
-2014-108,"WHID 2014-108: World Of Warcraft, Hearthstone Hit By DDoS Attacks And ISP Issues","In Europe, hackers are causing problems with distributed denial-of-service (DDoS) attacks. The result is that every online game by the company has been disrupted.",http://www.cinemablend.com/games/World-Warcraft-Hearthstone-Hit-By-DDoS-Attacks-ISP-Issues-63106.html,3/31/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Gaming,,,,,,,,,,
-2014-108,"WHID 2014-108: World Of Warcraft, Hearthstone Hit By DDoS Attacks And ISP Issues","In Europe, hackers are causing problems with distributed denial-of-service (DDoS) attacks. The result is that every online game by the company has been disrupted.",http://www.cinemablend.com/games/World-Warcraft-Hearthstone-Hit-By-DDoS-Attacks-ISP-Issues-63106.html,3/31/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Gaming,,,,,,,,,,
-2014-109,WHID 2014-109: SurveyGizmo Recovers from DDoS Attack Despite ?Communication Issues? with Hosting Provider ViaWest,"After almost two days of disrupted service, SurveyGizmo has completely recovered from a DDoS attack. According to Jason Carolan, CTO of SurveyGizmo?s web host ViaWest, the attack was persistent and estimated at between 20 and 40 Gbps.",http://www.thewhir.com/web-hosting-news/surveygizmo-recovers-ddos-attack-despite-communication-issues-hosting-provider-viawest,3/28/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Technology,,,,,,,,,,
-2014-109,WHID 2014-109: SurveyGizmo Recovers from DDoS Attack Despite ?Communication Issues? with Hosting Provider ViaWest,"After almost two days of disrupted service, SurveyGizmo has completely recovered from a DDoS attack. According to Jason Carolan, CTO of SurveyGizmo?s web host ViaWest, the attack was persistent and estimated at between 20 and 40 Gbps.",http://www.thewhir.com/web-hosting-news/surveygizmo-recovers-ddos-attack-despite-communication-issues-hosting-provider-viawest,3/28/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Technology,,,,,,,,,,
-2014-110,WHID 2014-110: EA Games website hacked to steal Apple IDs,An EA Games server has been compromised by hackers and is now hosting a phishing site which targets Apple ID account holders.,http://news.netcraft.com/archives/2014/03/19/ea-games-website-hacked-to-steal-apple-ids.html,3/19/2014,OS Commanding,Improper Input Handling,Phishing,Gaming,,,,,,,,,,
-2014-110,WHID 2014-110: EA Games website hacked to steal Apple IDs,An EA Games server has been compromised by hackers and is now hosting a phishing site which targets Apple ID account holders.,http://news.netcraft.com/archives/2014/03/19/ea-games-website-hacked-to-steal-apple-ids.html,3/19/2014,OS Commanding,Improper Input Handling,Phishing,Gaming,,,,,,,,,,
-2014-111,WHID 2014-111: W3C website fell victim to an SQL injection,It has come to to light today that the website of W3C (World Wide Web Consortium) has fallen victim to an SQL injection from an unknown party.,http://www.hackingdaily.com/2014/03/w3c-hacked-by-sql.html,3/1/2014,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,,,,,,,,,
-2014-111,WHID 2014-111: W3C website fell victim to an SQL injection,It has come to to light today that the website of W3C (World Wide Web Consortium) has fallen victim to an SQL injection from an unknown party.,http://www.hackingdaily.com/2014/03/w3c-hacked-by-sql.html,3/1/2014,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,,,,,,,,,
-2014-112,"WHID 2014-112: Thieves Jam Up Smucker?s, Card Processor","Not all of the above-mentioned victims involved the exploitation of ColdFusion vulnerabilities, but Smucker?s was included in a list of compromised online stores that I regrettably lost track of toward the end of 2013, amid a series of investigations involving breaches at much bigger victims.",http://krebsonsecurity.com/2014/03/thieves-jam-up-smuckers-card-processor/,3/14/2014,Local File Inclusion (LFI),Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2014-112,"WHID 2014-112: Thieves Jam Up Smucker?s, Card Processor","Not all of the above-mentioned victims involved the exploitation of ColdFusion vulnerabilities, but Smucker?s was included in a list of compromised online stores that I regrettably lost track of toward the end of 2013, amid a series of investigations involving breaches at much bigger victims.",http://krebsonsecurity.com/2014/03/thieves-jam-up-smuckers-card-processor/,3/14/2014,Local File Inclusion (LFI),Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2014-113,WHID 2014-113: Denial-Of-Service Attack Snags Meetup.com For Days,"Meetup.com was back online Monday, after a series of massive denial-of-service attacks that lasted off and on for four days.",http://newyork.cbslocal.com/2014/03/03/denial-of-service-attack-snags-meetup-com-for-days/,3/4/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Social,,,,,,,,,,
-2014-113,WHID 2014-113: Denial-Of-Service Attack Snags Meetup.com For Days,"Meetup.com was back online Monday, after a series of massive denial-of-service attacks that lasted off and on for four days.",http://newyork.cbslocal.com/2014/03/03/denial-of-service-attack-snags-meetup-com-for-days/,3/4/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Social,,,,,,,,,,
-2014-114,WHID 2014-114: High-Profile Domains from Congo Defaced via Hack Attack on NIC,"The Congo domains (.cd) for Amazon, Audi, AVG, BBC, BMW, Canon, DHL, eBay, Fujitsu, GoDaddy, Hitachi, Honda, IBM, Panasonic, Toshiba, Mercedes, Rolex, Samsung, T-Mobile, Volkswagen and many others have been defaced by hackers of TeaM MaDLeeTs.",http://news.softpedia.com/news/High-Profile-Domains-from-Congo-Defaced-via-Hack-Attack-on-NIC-430140.shtml,3/3/2014,DNS Hijacking,Insufficient Process Validation,Defacement,Service Provider,,,,,,,,,,
-2014-114,WHID 2014-114: High-Profile Domains from Congo Defaced via Hack Attack on NIC,"The Congo domains (.cd) for Amazon, Audi, AVG, BBC, BMW, Canon, DHL, eBay, Fujitsu, GoDaddy, Hitachi, Honda, IBM, Panasonic, Toshiba, Mercedes, Rolex, Samsung, T-Mobile, Volkswagen and many others have been defaced by hackers of TeaM MaDLeeTs.",http://news.softpedia.com/news/High-Profile-Domains-from-Congo-Defaced-via-Hack-Attack-on-NIC-430140.shtml,3/3/2014,DNS Hijacking,Insufficient Process Validation,Defacement,Service Provider,,,,,,,,,,
-2014-115,WHID 2014-115: Website of International Video News Agency Ruptly Hit With DDOS Attack,"Moments ago, the Ruptly international video news agency, which is part of the RT (Russia Today) global news network, announced that its website is under a distributed denial-of-service (DDOS) attack.",http://news.softpedia.com/news/Website-of-International-Video-News-Agency-Ruptly-Hit-With-DDOS-Attack-430390.shtml,3/4/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Media,,,,,,,,,,
-2014-115,WHID 2014-115: Website of International Video News Agency Ruptly Hit With DDOS Attack,"Moments ago, the Ruptly international video news agency, which is part of the RT (Russia Today) global news network, announced that its website is under a distributed denial-of-service (DDOS) attack.",http://news.softpedia.com/news/Website-of-International-Video-News-Agency-Ruptly-Hit-With-DDOS-Attack-430390.shtml,3/4/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Media,,,,,,,,,,
-2014-116,WHID 2014-116: North Dakota university system says server hacked,"A North Dakota University System computer server that stores personal data of nearly 300,000 past and present students was hacked, university system officials announced Wednesday.",http://bismarcktribune.com/news/state-and-regional/north-dakota-university-system-says-server-hacked/article_2c11572a-a4ad-11e3-ac1d-001a4bcf887a.html,3/5/2014,Unknown,Unknown,Leakage of Information,Education,,,,,,,,,,
-2014-116,WHID 2014-116: North Dakota university system says server hacked,"A North Dakota University System computer server that stores personal data of nearly 300,000 past and present students was hacked, university system officials announced Wednesday.",http://bismarcktribune.com/news/state-and-regional/north-dakota-university-system-says-server-hacked/article_2c11572a-a4ad-11e3-ac1d-001a4bcf887a.html,3/5/2014,Unknown,Unknown,Leakage of Information,Education,,,,,,,,,,
-2014-117,WHID 2014-117: Sally Beauty Confirms Card Data Breach,Nationwide cosmetics and beauty retailer Sally Beauty today confirmed that hackers had broken into its networks and stolen credit card data from stores.,http://krebsonsecurity.com/2014/03/sally-beauty-confirms-card-data-breach/,3/14/2014,Unknown,Unknown,Leakage of Information,Retail,,,,,,,,,,
-2014-117,WHID 2014-117: Sally Beauty Confirms Card Data Breach,Nationwide cosmetics and beauty retailer Sally Beauty today confirmed that hackers had broken into its networks and stolen credit card data from stores.,http://krebsonsecurity.com/2014/03/sally-beauty-confirms-card-data-breach/,3/14/2014,Unknown,Unknown,Leakage of Information,Retail,,,,,,,,,,
-2014-118,"WHID 2014-118: Statistics Company Statista Hacked, Email Addresses and Passwords Possibly Stolen","Statista, the company that provides statistics and studies from over 18,000 sources, has been hacked. The company believes the hackers could have accessed its user database.",http://news.softpedia.com/news/Statistics-Company-Statista-Hacked-Email-Addresses-and-Passwords-Possibly-Stolen-431173.shtml,3/8/2014,Unknown,Unknown,Leakage of Information,Technology,,,,,,,,,,
-2014-118,"WHID 2014-118: Statistics Company Statista Hacked, Email Addresses and Passwords Possibly Stolen","Statista, the company that provides statistics and studies from over 18,000 sources, has been hacked. The company believes the hackers could have accessed its user database.",http://news.softpedia.com/news/Statistics-Company-Statista-Hacked-Email-Addresses-and-Passwords-Possibly-Stolen-431173.shtml,3/8/2014,Unknown,Unknown,Leakage of Information,Technology,,,,,,,,,,
-2014-119,WHID 2014-119: COMIXOLOGY URGES USERS TO CHANGE PASSWORDS IN WAKE OF SERVER HACK,"Earlier this morning, digital comics publisher comiXology sent out an email notifying subscribers that it had discovered its database had recently been compromised. While comiXology states that credit card information should be safe -- it does not store card numbers on its servers -- it is suggested users of the digital platform immediately change their password immediately.",http://www.comicbookresources.com/?page=article&id=51291,3/6/2014,Unknown,Unknown,Leakage of Information,Entertainment,,,,,,,,,,
-2014-119,WHID 2014-119: COMIXOLOGY URGES USERS TO CHANGE PASSWORDS IN WAKE OF SERVER HACK,"Earlier this morning, digital comics publisher comiXology sent out an email notifying subscribers that it had discovered its database had recently been compromised. While comiXology states that credit card information should be safe -- it does not store card numbers on its servers -- it is suggested users of the digital platform immediately change their password immediately.",http://www.comicbookresources.com/?page=article&id=51291,3/6/2014,Unknown,Unknown,Leakage of Information,Entertainment,,,,,,,,,,
-2014-120,WHID 2014-120: Hacker breaches Hopkins server,"Names, email addresses and phone numbers from about 850 current and former Johns Hopkins University biomedical engineering students were posted online Thursday, stolen by someone claiming to be part of the hacker group known as Anonymous.",http://articles.baltimoresun.com/2014-03-07/news/bs-md-hopkins-servers-hacked-20140306_1_engineering-students-identity-theft-server,3/7/2014,Unknown,Unknown,Leakage of Information,Education,,,,,,,,,,
-2014-120,WHID 2014-120: Hacker breaches Hopkins server,"Names, email addresses and phone numbers from about 850 current and former Johns Hopkins University biomedical engineering students were posted online Thursday, stolen by someone claiming to be part of the hacker group known as Anonymous.",http://articles.baltimoresun.com/2014-03-07/news/bs-md-hopkins-servers-hacked-20140306_1_engineering-students-identity-theft-server,3/7/2014,Unknown,Unknown,Leakage of Information,Education,,,,,,,,,,
-2014-121,WHID 2014-121: Citroen becomes the latest victim of Adobe ColdFusion hackers,"One of the carmaker?s German websites hacked to include a backdoor last year, following similar cases elsewhere",http://www.theguardian.com/technology/2014/mar/17/citroen-adobe-coldfusion-hacked-backdoor,3/17/2014,Local File Inclusion (LFI),Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2014-121,WHID 2014-121: Citroen becomes the latest victim of Adobe ColdFusion hackers,"One of the carmaker?s German websites hacked to include a backdoor last year, following similar cases elsewhere",http://www.theguardian.com/technology/2014/mar/17/citroen-adobe-coldfusion-hacked-backdoor,3/17/2014,Local File Inclusion (LFI),Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2014-122,"WHID 2014-122: Over 500,000 PCs attacked every day after 25,000 UNIX servers hijacked by Operation Windigo","The attack, which has been given the name ?Windigo? after a mythical creature from Algonquian Native American folklore, has resulted in over 25,000 Unix servers being hacked, resulting in 35 million spam messages being sent each day from compromised machines.",http://www.welivesecurity.com/2014/03/18/attack-unix-operation-windigo/,3/18/2014,Stolen Credentials,Insufficient Authentication,SPAM Links,Technology,,,,,,,,,,
-2014-122,"WHID 2014-122: Over 500,000 PCs attacked every day after 25,000 UNIX servers hijacked by Operation Windigo","The attack, which has been given the name ?Windigo? after a mythical creature from Algonquian Native American folklore, has resulted in over 25,000 Unix servers being hacked, resulting in 35 million spam messages being sent each day from compromised machines.",http://www.welivesecurity.com/2014/03/18/attack-unix-operation-windigo/,3/18/2014,Stolen Credentials,Insufficient Authentication,SPAM Links,Technology,,,,,,,,,,
-2014-123,"WHID 2014-123: Guatemala Sites of Renault, Toyota and Chevrolet Hacked and Defaced","The Guatemala websites of Renault, Toyota and Chevrolet have been hacked and defaced by a member of a Pakistani group called Team Cyber Criminals.",http://news.softpedia.com/news/Guatemala-Sites-of-Renault-Toyota-and-Chevrolet-Hacked-and-Defaced-432682.shtml,3/18/2014,Unknown,Unknown,Defacement,Automotive,,,,,,,,,,
-2014-123,"WHID 2014-123: Guatemala Sites of Renault, Toyota and Chevrolet Hacked and Defaced","The Guatemala websites of Renault, Toyota and Chevrolet have been hacked and defaced by a member of a Pakistani group called Team Cyber Criminals.",http://news.softpedia.com/news/Guatemala-Sites-of-Renault-Toyota-and-Chevrolet-Hacked-and-Defaced-432682.shtml,3/18/2014,Unknown,Unknown,Defacement,Automotive,,,,,,,,,,
-2014-124,WHID 2014-124: Foreign Minister Julie Bishop confirms her Twitter account was hacked,"On Monday morning, Ms Bishop's spokeswoman said: ""In weightier issues today, the Australian Foreign Minister?s Twitter account was accessed by spambots alerting her more than 50,000 followers to the latest innovations in weight loss, instead of her usual diplomatic endeavours. Twitter was quickly on the case and the situation swiftly handled.?",http://www.smh.com.au/federal-politics/political-news/foreign-minister-julie-bishop-confirms-her-twitter-account-was-hacked-20140317-34wc8.html,3/17/2014,Unknown,Insufficient Authentication,SPAM Links,Social,,,,,,,,,,
-2014-124,WHID 2014-124: Foreign Minister Julie Bishop confirms her Twitter account was hacked,"On Monday morning, Ms Bishop's spokeswoman said: ""In weightier issues today, the Australian Foreign Minister?s Twitter account was accessed by spambots alerting her more than 50,000 followers to the latest innovations in weight loss, instead of her usual diplomatic endeavours. Twitter was quickly on the case and the situation swiftly handled.?",http://www.smh.com.au/federal-politics/political-news/foreign-minister-julie-bishop-confirms-her-twitter-account-was-hacked-20140317-34wc8.html,3/17/2014,Unknown,Insufficient Authentication,SPAM Links,Social,,,,,,,,,,
-2014-125,"WHID 2014-125: Hack of Boxee.tv exposes password data, messages for 158,000 users","Hackers posted names, e-mail addresses, message histories, and partially protected login credentials for more than 158,000 forum users of Boxee.tv, the Web-based television service that was acquired by Samsung last year, researchers said.",http://arstechnica.com/security/2014/04/hack-of-boxee-tv-exposes-password-data-messages-for-158000-users/,4/1/2014,Unknown,Unknown,Leakage of Information,Technology,,,,,,,,,,
-2014-125,"WHID 2014-125: Hack of Boxee.tv exposes password data, messages for 158,000 users","Hackers posted names, e-mail addresses, message histories, and partially protected login credentials for more than 158,000 forum users of Boxee.tv, the Web-based television service that was acquired by Samsung last year, researchers said.",http://arstechnica.com/security/2014/04/hack-of-boxee-tv-exposes-password-data-messages-for-158000-users/,4/1/2014,Unknown,Unknown,Leakage of Information,Technology,,,,,,,,,,
-2014-126,WHID 2014-126: Gov't contractor Klas Telecom responds to getting hacked by NullCrew,A skirmish erupted last week when hacking group NullCrew successfully broke into tactical communications company Klas Telecom. The global government contractor had an interesting response to its attackers.,http://www.zdnet.com/govt-contractor-klas-telecom-responds-to-getting-hacked-by-nullcrew-7000028102/,4/6/2014,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,,,,,,,,,
-2014-126,WHID 2014-126: Gov't contractor Klas Telecom responds to getting hacked by NullCrew,A skirmish erupted last week when hacking group NullCrew successfully broke into tactical communications company Klas Telecom. The global government contractor had an interesting response to its attackers.,http://www.zdnet.com/govt-contractor-klas-telecom-responds-to-getting-hacked-by-nullcrew-7000028102/,4/6/2014,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,,,,,,,,,
-2014-127,"WHID 2014-127: Email Marketing Service Mad Mimi Hit by DDOS Attacks, Blackmailed","On Sunday, March 30, email marketing service Mad Mimi was hit by a distributed denial-of-service (DDOS) attack. Shortly after, they received an email from someone who asked for 1.8 Bitcoins to stop launching attacks.",http://news.softpedia.com/news/Email-Marketing-Service-Mad-Mimi-Hit-by-DDOS-Attacks-Blackmailed-435152.shtml,4/1/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Advertising,,,,,,,,,,
-2014-127,"WHID 2014-127: Email Marketing Service Mad Mimi Hit by DDOS Attacks, Blackmailed","On Sunday, March 30, email marketing service Mad Mimi was hit by a distributed denial-of-service (DDOS) attack. Shortly after, they received an email from someone who asked for 1.8 Bitcoins to stop launching attacks.",http://news.softpedia.com/news/Email-Marketing-Service-Mad-Mimi-Hit-by-DDOS-Attacks-Blackmailed-435152.shtml,4/1/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Advertising,,,,,,,,,,
-2014-128,WHID 2014-128: SQL Injection Leads To BigMoneyJobs.com Leak,"Earlier today, a hacker identified as ProbablyOnion (who recently breached Boxee.tv) has posted data from a large job seeker website resulting in over 36,000 accounts being published online.",https://www.riskbasedsecurity.com/2014/04/sql-injection-leads-to-bigmoneyjobs-com-leak/,4/2/2014,SQL Injection,Improper Input Handling,Leakage of Information,Advertising,,,,,,,,,,
-2014-128,WHID 2014-128: SQL Injection Leads To BigMoneyJobs.com Leak,"Earlier today, a hacker identified as ProbablyOnion (who recently breached Boxee.tv) has posted data from a large job seeker website resulting in over 36,000 accounts being published online.",https://www.riskbasedsecurity.com/2014/04/sql-injection-leads-to-bigmoneyjobs-com-leak/,4/2/2014,SQL Injection,Improper Input Handling,Leakage of Information,Advertising,,,,,,,,,,
-2014-129,WHID 2014-129: Anti-media cybercrime spree continues: Al Arabiya hacked by NullCrew,"After hacking and humiliating Comcast in February, NullCrew is back with HorsemenLulz in a successful hack on the mail servers of the second biggest media company in the Arab world, Al Arabiya.",http://www.zdnet.com/anti-media-cybercrime-spree-continues-al-arabiya-hacked-by-nullcrew-7000028004/,4/3/2014,Local File Inclusion (LFI),Improper Input Handling,Leakage of Information,Media,,,,,,,,,,
-2014-129,WHID 2014-129: Anti-media cybercrime spree continues: Al Arabiya hacked by NullCrew,"After hacking and humiliating Comcast in February, NullCrew is back with HorsemenLulz in a successful hack on the mail servers of the second biggest media company in the Arab world, Al Arabiya.",http://www.zdnet.com/anti-media-cybercrime-spree-continues-al-arabiya-hacked-by-nullcrew-7000028004/,4/3/2014,Local File Inclusion (LFI),Improper Input Handling,Leakage of Information,Media,,,,,,,,,,
-2014-130,WHID 2014-130: European Cyber Army Hacker Targets Syria,"Over 60,000 full names, user names, phone numbers and home addresses were leaked, along with several encrypted passwords and several in clear text.",http://www.esecurityplanet.com/hackers/european-cyber-army-hacker-targets-syria.html,4/9/2014,SQL Injection,Improper Input Handling,Leakage of Information,Advertising,,,,,,,,,,
-2014-130,WHID 2014-130: European Cyber Army Hacker Targets Syria,"Over 60,000 full names, user names, phone numbers and home addresses were leaked, along with several encrypted passwords and several in clear text.",http://www.esecurityplanet.com/hackers/european-cyber-army-hacker-targets-syria.html,4/9/2014,SQL Injection,Improper Input Handling,Leakage of Information,Advertising,,,,,,,,,,
-2014-131,WHID 2014-131: Operation SnowMan: DeputyDog Actor Compromises US Veterans of Foreign Wars Website,"After compromising the VFW website, the attackers added an iframe into the beginning of the website?s HTML code that loads the attacker?s page in the background. The attacker?s HTML/JavaScript page runs a Flash object, which orchestrates the remainder of the exploit.",http://www.fireeye.com/blog/uncategorized/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html,2/13/2014,Unknown,Unknown,Planting of Malware,Government,,,,,,,,,,
-2014-131,WHID 2014-131: Operation SnowMan: DeputyDog Actor Compromises US Veterans of Foreign Wars Website,"After compromising the VFW website, the attackers added an iframe into the beginning of the website?s HTML code that loads the attacker?s page in the background. The attacker?s HTML/JavaScript page runs a Flash object, which orchestrates the remainder of the exploit.",http://www.fireeye.com/blog/uncategorized/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html,2/13/2014,Unknown,Unknown,Planting of Malware,Government,,,,,,,,,,
-2014-132,WHID 2014-132: Astros Respond After Hackers Breach Internal Database,The Houston Astros say they have been the victims of hackers who accessed their servers and published months of internal trade talks on the Internet.,http://www.kwtx.com/sports/headlines/Astros-Respond-To-Security-Breach-265301541.html?ref=541,6/30/2014,Unknown,Unknown,Leakage of Information,Sports,,,,,,,,,,
-2014-132,WHID 2014-132: Astros Respond After Hackers Breach Internal Database,The Houston Astros say they have been the victims of hackers who accessed their servers and published months of internal trade talks on the Internet.,http://www.kwtx.com/sports/headlines/Astros-Respond-To-Security-Breach-265301541.html?ref=541,6/30/2014,Unknown,Unknown,Leakage of Information,Sports,,,,,,,,,,
-2014-133,WHID 2014-133: Town website hacked,Visitors accessing the Town of Grand Falls-Windsor?s official website late last week or over the weekend may have gotten a shock.,http://www.gfwadvertiser.ca/News/Local/2014-07-15/article-3801475/Town-website-hacked/1,7/15/2014,Unknown,Unknown,SPAM Links,Government,,,,,,,,,,
-2014-133,WHID 2014-133: Town website hacked,Visitors accessing the Town of Grand Falls-Windsor?s official website late last week or over the weekend may have gotten a shock.,http://www.gfwadvertiser.ca/News/Local/2014-07-15/article-3801475/Town-website-hacked/1,7/15/2014,Unknown,Unknown,SPAM Links,Government,,,,,,,,,,
-2014-134,WHID 2014-134: CNET Confirms Russian Hack,"W0rm, which uses the Twitter handle @rev_priv8, tweeted a screenshot purportedly showing the contents of the CNET database. He or she said that a security hole in CNET.com's implementation of the Symfony PHP framework was the attack vector.",http://www.infosecurity-magazine.com/view/39323/cnet-confirms-russian-hack,7/15/2014,Code Injection,Improper Input Handling,Leakage of Information,Media,,,,,,,,,,
-2014-134,WHID 2014-134: CNET Confirms Russian Hack,"W0rm, which uses the Twitter handle @rev_priv8, tweeted a screenshot purportedly showing the contents of the CNET database. He or she said that a security hole in CNET.com's implementation of the Symfony PHP framework was the attack vector.",http://www.infosecurity-magazine.com/view/39323/cnet-confirms-russian-hack,7/15/2014,Code Injection,Improper Input Handling,Leakage of Information,Media,,,,,,,,,,
-2014-135,"WHID 2014-135: B.C. PharmaNet hit by hacker, 1,600 accounts breached","About 1,600 patients had their private data in the provincial PharmaNet ?prescription system accessed by an unknown hacker, a Health Ministry investigation has revealed.",http://www.cbc.ca/news/canada/british-columbia/b-c-pharmanet-hit-by-hacker-1-600-accounts-breached-1.2704446,7/11/2014,Stolen Credentials,Insufficient Authentication,Leakage of Information,Healthcare,,,,,,,,,,
-2014-135,"WHID 2014-135: B.C. PharmaNet hit by hacker, 1,600 accounts breached","About 1,600 patients had their private data in the provincial PharmaNet ?prescription system accessed by an unknown hacker, a Health Ministry investigation has revealed.",http://www.cbc.ca/news/canada/british-columbia/b-c-pharmanet-hit-by-hacker-1-600-accounts-breached-1.2704446,7/11/2014,Stolen Credentials,Insufficient Authentication,Leakage of Information,Healthcare,,,,,,,,,,
-2014-136,WHID 2014-136: Bank account of Saudi hacked,"A Saudi man in Bashair has filed a complaint saying that an anonymous individual had hacked into his bank account and transferred SR18,430 to another account through local transfer, adding that he is worried that the money would land in the wrong hands.",http://www.arabnews.com/news/603681,7/18/2014,Unknown,Unknown,Monetary Loss,Finance,,,,,,,,,,
-2014-136,WHID 2014-136: Bank account of Saudi hacked,"A Saudi man in Bashair has filed a complaint saying that an anonymous individual had hacked into his bank account and transferred SR18,430 to another account through local transfer, adding that he is worried that the money would land in the wrong hands.",http://www.arabnews.com/news/603681,7/18/2014,Unknown,Unknown,Monetary Loss,Finance,,,,,,,,,,
-2014-137,WHID 2014-137: Anonymous hacks Israeli websites in new pro-Palestine campaign,Anonymous has laid claim to the downing of 500 Israeli web pages as part of a cyber attack by the group in support of the people of Palestine.,http://www.itproportal.com/2014/04/07/anonymous-hacks-israeli-websites-in-new-pro-palestine-campaign/,4/7/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,Yes,OpIsrael,,,,,,,
-2014-137,WHID 2014-137: Anonymous hacks Israeli websites in new pro-Palestine campaign,Anonymous has laid claim to the downing of 500 Israeli web pages as part of a cyber attack by the group in support of the people of Palestine.,http://www.itproportal.com/2014/04/07/anonymous-hacks-israeli-websites-in-new-pro-palestine-campaign/,4/7/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,Yes,OpIsrael,,,,,,,
-2014-138,"WHID 2014-138: #OpSaveGaza: Anonymous Takes Down 1,000 Israeli Government and Business Websites","Hacker collective Anonymous has announced that it has taken down over a thousand of crucial Israeli websites in a huge new coordinated cyber-attack called #OpSaveGaza on 11 July and 17 July, in support of the people of Palestine.",http://www.ibtimes.co.uk/opsavegaza-anonymous-takes-down-1000-israeli-government-business-websites-1457269,7/19/2014,Denial of Service,Insufficient Anti-Automation,Downtiime,Government,,Yes,OpSaveGaza,,,,,,,
-2014-138,"WHID 2014-138: #OpSaveGaza: Anonymous Takes Down 1,000 Israeli Government and Business Websites","Hacker collective Anonymous has announced that it has taken down over a thousand of crucial Israeli websites in a huge new coordinated cyber-attack called #OpSaveGaza on 11 July and 17 July, in support of the people of Palestine.",http://www.ibtimes.co.uk/opsavegaza-anonymous-takes-down-1000-israeli-government-business-websites-1457269,7/19/2014,Denial of Service,Insufficient Anti-Automation,Downtiime,Government,,Yes,OpSaveGaza,,,,,,,
-2014-139,WHID 2014-139: Hacker Goes On Spree Against Musicians' Websites,An online activist known only as Ethical Dragon has been reportedly hacking the websites of musicians and celebrities he feels have been ignoring his efforts to communicate with him (or her).,http://themusic.com.au/news/all/2014/07/19/hacker-goes-on-spree-against-musicians-websites/,7/18/2014,Unknown,Unknown,Defacement,Entertainment,,,,,,,,,,
-2014-139,WHID 2014-139: Hacker Goes On Spree Against Musicians' Websites,An online activist known only as Ethical Dragon has been reportedly hacking the websites of musicians and celebrities he feels have been ignoring his efforts to communicate with him (or her).,http://themusic.com.au/news/all/2014/07/19/hacker-goes-on-spree-against-musicians-websites/,7/18/2014,Unknown,Unknown,Defacement,Entertainment,,,,,,,,,,
-2014-140,WHID 2014-140: Shelby County Schools' direct deposit data hacked,Shelby County Schools is limiting access to the direct deposit portion of its employee portal after bank routing and account numbers for at least 10 employees were changed and routed instead to prepaid cards.,http://www.commercialappeal.com/news/local-news/schools/shelby-county-schools-direct-deposit-data-hacked_31644341,7/18/2014,Unknown,Unknown,Monetary Loss,Education,,,,,,,,,,
-2014-140,WHID 2014-140: Shelby County Schools' direct deposit data hacked,Shelby County Schools is limiting access to the direct deposit portion of its employee portal after bank routing and account numbers for at least 10 employees were changed and routed instead to prepaid cards.,http://www.commercialappeal.com/news/local-news/schools/shelby-county-schools-direct-deposit-data-hacked_31644341,7/18/2014,Unknown,Unknown,Monetary Loss,Education,,,,,,,,,,
-2014-141,"WHID 2014-141: Hackers steal user data from the European Central Bank website, ask for money","The attackers exploited a vulnerability to access a database serving the ECB?s public website, the institution announced Thursday on its website. No internal systems or market sensitive data were affected, the ECB said.",http://www.pcworld.com/article/2457960/hackers-steal-user-data-from-the-european-central-bank-website-ask-for-money.html,7/24/2014,SQL Injection,Improper Input Handling,Leakage of Information,Finance,,,,,,,,,,
-2014-141,"WHID 2014-141: Hackers steal user data from the European Central Bank website, ask for money","The attackers exploited a vulnerability to access a database serving the ECB?s public website, the institution announced Thursday on its website. No internal systems or market sensitive data were affected, the ECB said.",http://www.pcworld.com/article/2457960/hackers-steal-user-data-from-the-european-central-bank-website-ask-for-money.html,7/24/2014,SQL Injection,Improper Input Handling,Leakage of Information,Finance,,,,,,,,,,
-2014-142,"WHID 2014-142: WORDPRESS SITES SEEING INCREASED MALWARE, BRUTE FORCE ATTACKS THIS WEEK","A glut of WordPress sites have fallen victim to both malware infections and a series of brute force attacks that have been making the rounds over the past several days, researchers claim.",http://threatpost.com/wordpress-sites-seeing-increased-malware-brute-force-attacks-this-week,7/23/2014,Brute Force,Insufficient Anti-Automation,Account Takeover,Blogs,,,,,,,,,,
-2014-142,"WHID 2014-142: WORDPRESS SITES SEEING INCREASED MALWARE, BRUTE FORCE ATTACKS THIS WEEK","A glut of WordPress sites have fallen victim to both malware infections and a series of brute force attacks that have been making the rounds over the past several days, researchers claim.",http://threatpost.com/wordpress-sites-seeing-increased-malware-brute-force-attacks-this-week,7/23/2014,Brute Force,Insufficient Anti-Automation,Account Takeover,Blogs,,,,,,,,,,
-2014-143,"WHID 2014-143: WSJ website hacked, data offered for sale for 1 bitcoin","However, Komarov, whose firm discovered the posting offering the vulnerabilities, said that IntelCrawl had confirmed that a SQL injection vulnerability in the wsj.com site made it possible ?to get access to any database on the wsj.com server.?",http://arstechnica.com/security/2014/07/wsj-website-hacked-data-offered-for-sale-for-1-bitcoin/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+arstechnica%2Findex+(Ars+Technica+-+All+content),7/23/2014,SQL Injection,Improper Input Handling,Leakage of Information,Media,,,,,,,,,,
-2014-143,"WHID 2014-143: WSJ website hacked, data offered for sale for 1 bitcoin","However, Komarov, whose firm discovered the posting offering the vulnerabilities, said that IntelCrawl had confirmed that a SQL injection vulnerability in the wsj.com site made it possible ?to get access to any database on the wsj.com server.?",http://arstechnica.com/security/2014/07/wsj-website-hacked-data-offered-for-sale-for-1-bitcoin/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+arstechnica%2Findex+(Ars+Technica+-+All+content),7/23/2014,SQL Injection,Improper Input Handling,Leakage of Information,Media,,,,,,,,,,
-2014-144,"WHID 2014-144: AskMen website hacked twice in the past month, sending malicious code","For the second time in the past month, AskMen.com was compromised, with malicious code injected on the company's server sending out attacks. AskMen is reportedly looking into the security issue after being contacted by security software company Malwarebytes.",http://www.tweaktown.com/news/39211/askmen-website-hacked-twice-in-the-past-month-sending-malicious-code/index.html,7/22/2014,Unknown,Unknown,Planting of Malware,Media,,,,,,,,,,
-2014-144,"WHID 2014-144: AskMen website hacked twice in the past month, sending malicious code","For the second time in the past month, AskMen.com was compromised, with malicious code injected on the company's server sending out attacks. AskMen is reportedly looking into the security issue after being contacted by security software company Malwarebytes.",http://www.tweaktown.com/news/39211/askmen-website-hacked-twice-in-the-past-month-sending-malicious-code/index.html,7/22/2014,Unknown,Unknown,Planting of Malware,Media,,,,,,,,,,
-2014-145,WHID 2014-145: Hackers bypass online security at 34 banks,"Cybercriminals are sneaking past security protections to access online accounts across 34 banks in Switzerland, Sweden, Austria and Japan. And in doing so, experts say, the hackers are defeating what?s often touted as one of the more effective online security protocols.",http://www.marketwatch.com/story/hackers-bypass-online-security-at-34-banks-2014-07-22?siteid=bigcharts&dist=bigcharts,7/24/2014,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,,,,,,,,,,
-2014-145,WHID 2014-145: Hackers bypass online security at 34 banks,"Cybercriminals are sneaking past security protections to access online accounts across 34 banks in Switzerland, Sweden, Austria and Japan. And in doing so, experts say, the hackers are defeating what?s often touted as one of the more effective online security protocols.",http://www.marketwatch.com/story/hackers-bypass-online-security-at-34-banks-2014-07-22?siteid=bigcharts&dist=bigcharts,7/24/2014,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,,,,,,,,,,
-2014-146,WHID 2014-146: Blizzard confirms World of Warcraft target of DDoS attack,WoW Insider received reports earlier today that Blizzard may be the target of a significant DDoS effort -- and community manager Bashiok has confirmed it on the World of Warcraft forums.,http://wow.joystiq.com/2014/11/13/blizzard-confirms-world-of-warcraft-target-of-ddos-attack/,11/13/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Gaming,,,,,,,,,,
-2014-146,WHID 2014-146: Blizzard confirms World of Warcraft target of DDoS attack,WoW Insider received reports earlier today that Blizzard may be the target of a significant DDoS effort -- and community manager Bashiok has confirmed it on the World of Warcraft forums.,http://wow.joystiq.com/2014/11/13/blizzard-confirms-world-of-warcraft-target-of-ddos-attack/,11/13/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Gaming,,,,,,,,,,
-2014-147,WHID 2014-147: BrowserStack Hacked via Shellshock,The cross-browser testing service BrowserStack was recently breached by an attacker who leveraged his access to send an email to users claiming that the service was shutting down.,http://www.esecurityplanet.com/network-security/browserstack-hacked-via-shellshock.html,11/9/2014,OS Commanding,Improper Input Handling,Leakage of Information,Technology,,,ShellShock,,,,,,,
-2014-147,WHID 2014-147: BrowserStack Hacked via Shellshock,The cross-browser testing service BrowserStack was recently breached by an attacker who leveraged his access to send an email to users claiming that the service was shutting down.,http://www.esecurityplanet.com/network-security/browserstack-hacked-via-shellshock.html,11/9/2014,OS Commanding,Improper Input Handling,Leakage of Information,Technology,,,ShellShock,,,,,,,
-2014-148,"WHID 2014-148: Chinese hackers breach U.S. federal weather network, may have accessed classified data","Hackers from China breached the federal weather network recently, forcing cybersecurity teams to seal off data vital to disaster planning, aviation, shipping and scores of other crucial uses, officials said.",http://news.nationalpost.com/2014/11/12/chinese-hackers-breach-u-s-federal-weather-network-may-have-accessed-classified-data/,11/12/2014,Unknown,Unknown,Downtime,Government,,,,,,,,,,
-2014-148,"WHID 2014-148: Chinese hackers breach U.S. federal weather network, may have accessed classified data","Hackers from China breached the federal weather network recently, forcing cybersecurity teams to seal off data vital to disaster planning, aviation, shipping and scores of other crucial uses, officials said.",http://news.nationalpost.com/2014/11/12/chinese-hackers-breach-u-s-federal-weather-network-may-have-accessed-classified-data/,11/12/2014,Unknown,Unknown,Downtime,Government,,,,,,,,,,
-2014-149,WHID 2014-149: The Largest Cyber Attack In History Has Been Hitting Hong Kong Sites,"The distributed denial of service (DDoS) attacks have been carried out against independent news site Apple Daily and PopVote, which organised mock chief executive elections for Hong Kong.",http://www.forbes.com/sites/parmyolson/2014/11/20/the-largest-cyber-attack-in-history-has-been-hitting-hong-kong-sites/?ss=cio-network/,11/21/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Politics,,,,,,,,,,
-2014-149,WHID 2014-149: The Largest Cyber Attack In History Has Been Hitting Hong Kong Sites,"The distributed denial of service (DDoS) attacks have been carried out against independent news site Apple Daily and PopVote, which organised mock chief executive elections for Hong Kong.",http://www.forbes.com/sites/parmyolson/2014/11/20/the-largest-cyber-attack-in-history-has-been-hitting-hong-kong-sites/?ss=cio-network/,11/21/2014,Denial of Service,Insufficient Anti-Automation,Downtime,Politics,,,,,,,,,,
-2014-150,"WHID 2014-150: DerpTrolling leaks PSN, 2K, Windows Live customer logins","Hacker group DerpTrolling has released a ""very small portion"" of usernames and logins for three gaming networks in its possession as a ""warning to companies"".",http://www.cnet.com/news/derptrolling-leaks-psn-2k-windows-live-customer-logins/,11/20/2014,Unknown,Unknown,Leakage of Information,Gaming,,,,,,,,,,
-2014-150,"WHID 2014-150: DerpTrolling leaks PSN, 2K, Windows Live customer logins","Hacker group DerpTrolling has released a ""very small portion"" of usernames and logins for three gaming networks in its possession as a ""warning to companies"".",http://www.cnet.com/news/derptrolling-leaks-psn-2k-windows-live-customer-logins/,11/20/2014,Unknown,Unknown,Leakage of Information,Gaming,,,,,,,,,,
-2014-151,WHID 2014-151: ctf365.com defaced and account information taken,Hacking group defaced ctf365.com and obtained the username and password list.,http://www.reddit.com/r/hacking/comments/2nbsou/ctf365_hacked/,11/24/2014,Unknown,Unknown,Defacement,Technology,,,,,,,,,,
-2014-151,WHID 2014-151: ctf365.com defaced and account information taken,Hacking group defaced ctf365.com and obtained the username and password list.,http://www.reddit.com/r/hacking/comments/2nbsou/ctf365_hacked/,11/24/2014,Unknown,Unknown,Defacement,Technology,,,,,,,,,,
-2015-001,WHID 2015-001: iCloud accounts at risk of brute force attack as hacker exploits 'painfully obvious' password flaw,A developer claims to have discovered a flaw in Apple's iCloud security where an automated piece of software can be used to repeatedly guess a target's password.,http://www.ibtimes.co.uk/icloud-accounts-risk-brute-force-attack-hacker-exploits-painfully-obvious-password-flaw-1481623,1/2/2015,Brute Force,Insufficient Anti-Automation,Account Takeover,Technology,,,,,,,,,,
-2015-001,WHID 2015-001: iCloud accounts at risk of brute force attack as hacker exploits 'painfully obvious' password flaw,A developer claims to have discovered a flaw in Apple's iCloud security where an automated piece of software can be used to repeatedly guess a target's password.,http://www.ibtimes.co.uk/icloud-accounts-risk-brute-force-attack-hacker-exploits-painfully-obvious-password-flaw-1481623,1/2/2015,Brute Force,Insufficient Anti-Automation,Account Takeover,Technology,,,,,,,,,,
-2015-002,WHID 2015-002: Islamic script kiddies aim killer blow - at Bristol bus timetable website,Bristol residents looking for bus and train timetables were confronted by a message from Islamic militants following a defacement of the TravelWest website.,http://www.theregister.co.uk/2015/01/02/bristol_bus_timetable_website_defaced_militants/,1/2/2015,Unknown,Unknown,Defacement,Transportation,,,,,,,,,,
-2015-002,WHID 2015-002: Islamic script kiddies aim killer blow - at Bristol bus timetable website,Bristol residents looking for bus and train timetables were confronted by a message from Islamic militants following a defacement of the TravelWest website.,http://www.theregister.co.uk/2015/01/02/bristol_bus_timetable_website_defaced_militants/,1/2/2015,Unknown,Unknown,Defacement,Transportation,,,,,,,,,,
-2015-003,WHID 2015-003: Nordea: Online banking hit by hackers,"On the heels of Wednesday's attack on the OP-Pohjola Group's online banking services, Nordea announced on Friday afternoon that its online banking services had also been the target of a denial of services attack",http://yle.fi/uutiset/nordea_online_banking_hit_by_hackers/7718241,1/2/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Finance,,,,,,,,,,
-2015-003,WHID 2015-003: Nordea: Online banking hit by hackers,"On the heels of Wednesday's attack on the OP-Pohjola Group's online banking services, Nordea announced on Friday afternoon that its online banking services had also been the target of a denial of services attack",http://yle.fi/uutiset/nordea_online_banking_hit_by_hackers/7718241,1/2/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Finance,,,,,,,,,,
-2015-004,"WHID 2015-004: Battle.net Experiencing Unusual Major Disruptions, DDoS Speculated",Blizzard?s Battle.net service is having authentication issues today as hundred of angry gamers are clambering over each other wondering what?s going on.,http://www.gamerheadlines.com/2015/01/battle-net-experiencing-unusual-major-disruptions-ddos-speculated/,1/2/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Gaming,,,,,,,,,,
-2015-004,"WHID 2015-004: Battle.net Experiencing Unusual Major Disruptions, DDoS Speculated",Blizzard?s Battle.net service is having authentication issues today as hundred of angry gamers are clambering over each other wondering what?s going on.,http://www.gamerheadlines.com/2015/01/battle-net-experiencing-unusual-major-disruptions-ddos-speculated/,1/2/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Gaming,,,,,,,,,,
-2015-005,WHID 2015-005: Origin Accounts Hacked,According to Reddit and EA forum postings Origin users are having their accounts hacked and fraudulent purchases are being made.,http://www.hardcoregamer.com/2015/01/03/origin-accounts-hacked/127212/,1/3/2015,Unknown,Unknown,Account Takeover,Gaming,,,,,,,,,,
-2015-005,WHID 2015-005: Origin Accounts Hacked,According to Reddit and EA forum postings Origin users are having their accounts hacked and fraudulent purchases are being made.,http://www.hardcoregamer.com/2015/01/03/origin-accounts-hacked/127212/,1/3/2015,Unknown,Unknown,Account Takeover,Gaming,,,,,,,,,,
-2015-006,WHID 2015-006: Saudi Arabia hires 'ethical hackers' to silence smut slingers,"""The Commission members have succeeded in hacking Twitter pornography accounts, shutting them and arresting some of their owners over the past period,"" an unnamed spokesman told the publication. The agency did not say how it compromised the users, either through the use of malware or by softer methods such as open source intelligence gathering.",http://www.theregister.co.uk/2015/01/05/saudi_arabia_hires_ethical_hackers_to_silence_smut_slingers/,1/5/2015,Unknown,Unknown,Account Takeover,Social,,,,,,,,,,
-2015-006,WHID 2015-006: Saudi Arabia hires 'ethical hackers' to silence smut slingers,"""The Commission members have succeeded in hacking Twitter pornography accounts, shutting them and arresting some of their owners over the past period,"" an unnamed spokesman told the publication. The agency did not say how it compromised the users, either through the use of malware or by softer methods such as open source intelligence gathering.",http://www.theregister.co.uk/2015/01/05/saudi_arabia_hires_ethical_hackers_to_silence_smut_slingers/,1/5/2015,Unknown,Unknown,Account Takeover,Social,,,,,,,,,,
-2015-007,WHID 2015-007: en.asiadcp.com Buyer Info Dump,PasteBin DB Dump of data from http://en.asiadcp.com,http://pastebin.com/Wp8xCir3,1/1/2015,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2015-007,WHID 2015-007: en.asiadcp.com Buyer Info Dump,PasteBin DB Dump of data from http://en.asiadcp.com,http://pastebin.com/Wp8xCir3,1/1/2015,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2015-008,WHID 2015-008: differencegames.com Database Dump,PasteBin DB Dump of data from differencegames.com,http://pastebin.com/SJc2xDr8,1/1/2015,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2015-008,WHID 2015-008: differencegames.com Database Dump,PasteBin DB Dump of data from differencegames.com,http://pastebin.com/SJc2xDr8,1/1/2015,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2015-009,WHID 2015-009: ?Snooki?s? Instagram Account hacked by Arabic Speaking Hackers,"Nicole ?Snooki? Polizzi got a shock on the New Year eve, when she found out that her Instagram account had been taken over by unknown Arabic speaking hackers on Tuesday.",http://www.techworm.net/2015/01/snookis-instagram-account-hacked-by-arabic-speaking-hackers.html,1/1/2015,Brute Force,Insufficient Anti-Automation,Account Takeover,Social,,,,,,,,,,
-2015-009,WHID 2015-009: ?Snooki?s? Instagram Account hacked by Arabic Speaking Hackers,"Nicole ?Snooki? Polizzi got a shock on the New Year eve, when she found out that her Instagram account had been taken over by unknown Arabic speaking hackers on Tuesday.",http://www.techworm.net/2015/01/snookis-instagram-account-hacked-by-arabic-speaking-hackers.html,1/1/2015,Brute Force,Insufficient Anti-Automation,Account Takeover,Social,,,,,,,,,,
-2015-010,WHID 2015-010: 1.9m shoppers' data is hacked,HACKERS have stolen confidential data relating to almost two million online shoppers in France who made purchases via the French TV station website TF1.fr - See more at: http://www.connexionfrance.com/shoppers-data-hacked-tf1-magazine-subscription-website-16506-view-article.html#sthash.7vOravLn.dpuf,http://www.connexionfrance.com/shoppers-data-hacked-tf1-magazine-subscription-website-16506-view-article.html,1/4/2015,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2015-010,WHID 2015-010: 1.9m shoppers' data is hacked,HACKERS have stolen confidential data relating to almost two million online shoppers in France who made purchases via the French TV station website TF1.fr - See more at: http://www.connexionfrance.com/shoppers-data-hacked-tf1-magazine-subscription-website-16506-view-article.html#sthash.7vOravLn.dpuf,http://www.connexionfrance.com/shoppers-data-hacked-tf1-magazine-subscription-website-16506-view-article.html,1/4/2015,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2015-011,WHID 2015-011: MIT sites defaced in lead-up to anniversary of Aaron Swartz's death,"Attackers going under the name of ""Ulzr1z"" defaced websites for courses at the Massachusetts Institute of Technology (MIT).",https://nakedsecurity.sophos.com/2015/01/06/mit-sites-defaced-in-lead-up-to-anniversary-of-aaron-swartzs-death/,1/6/2015,Unknown,Unknown,Defacement,Education,,,,,,,,,,
-2015-011,WHID 2015-011: MIT sites defaced in lead-up to anniversary of Aaron Swartz's death,"Attackers going under the name of ""Ulzr1z"" defaced websites for courses at the Massachusetts Institute of Technology (MIT).",https://nakedsecurity.sophos.com/2015/01/06/mit-sites-defaced-in-lead-up-to-anniversary-of-aaron-swartzs-death/,1/6/2015,Unknown,Unknown,Defacement,Education,,,,,,,,,,
-2015-012,WHID 2015-012: United Nations Hacked by ulzr1z #REPOST,United Nations Sub-domain Hacked by UlzR1z,http://pastebin.com/GTmHYUyY,1/11/2015,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2015-012,WHID 2015-012: United Nations Hacked by ulzr1z #REPOST,United Nations Sub-domain Hacked by UlzR1z,http://pastebin.com/GTmHYUyY,1/11/2015,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2015-013,WHID 2015-013: United Nation Pakistan Website Hacked By Free Syrian Hacker,"The famous anti-Bashar Al Assad hacker Dr.SHA6H from Free Syrian Hacker group has hacked and defaced the official website of UNDP ? United Nations Development Programme, Pakistan against the ongoing Syrian conflict.",https://www.facebook.com/hackrons/posts/1023633604318713,1/6/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-013,WHID 2015-013: United Nation Pakistan Website Hacked By Free Syrian Hacker,"The famous anti-Bashar Al Assad hacker Dr.SHA6H from Free Syrian Hacker group has hacked and defaced the official website of UNDP ? United Nations Development Programme, Pakistan against the ongoing Syrian conflict.",https://www.facebook.com/hackrons/posts/1023633604318713,1/6/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-014,WHID 2015-014: TAN TOCK SENG: EDZ ELLO?S FACEBOOK ACCOUNT WAS HACKED WHEN HE MADE INSULTING COMMENTS,"Tan Tock Seng Hospital has explained that the insulting, anti-Singaporean comments made by one of their staff, Edz Ello, were posted while his facebook account was hacked.",http://therealsingapore.com/content/tan-tock-seng-edz-ello%E2%80%99s-facebook-account-was-hacked-when-he-made-insulting-comments,1/4/2015,Brute Force,Insufficient Anti-Automation,Account Takeover,Social,,,,,,,,,,
-2015-014,WHID 2015-014: TAN TOCK SENG: EDZ ELLO?S FACEBOOK ACCOUNT WAS HACKED WHEN HE MADE INSULTING COMMENTS,"Tan Tock Seng Hospital has explained that the insulting, anti-Singaporean comments made by one of their staff, Edz Ello, were posted while his facebook account was hacked.",http://therealsingapore.com/content/tan-tock-seng-edz-ello%E2%80%99s-facebook-account-was-hacked-when-he-made-insulting-comments,1/4/2015,Brute Force,Insufficient Anti-Automation,Account Takeover,Social,,,,,,,,,,
-2015-015,"WHID 2015-015: Universities hacked, data dumped","In a post on Pastebin yesterday, @MarxistAttorney (web site) claimed a number of hacks, including California State University, University of Kentucky, University of Connecticut, University of Maryland, Coastal Carolina University, and Abertay University.",http://www.databreaches.net/universities-hacked-data-dumped-by-marxistattorney/,1/4/2015,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2015-015,"WHID 2015-015: Universities hacked, data dumped","In a post on Pastebin yesterday, @MarxistAttorney (web site) claimed a number of hacks, including California State University, University of Kentucky, University of Connecticut, University of Maryland, Coastal Carolina University, and Abertay University.",http://www.databreaches.net/universities-hacked-data-dumped-by-marxistattorney/,1/4/2015,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2015-016,WHID: 2015-016: 10 million customer data stolen from Orange Spain,"To achieve this flight, hackers exploited a flaw, a SQL injection via two different reticular fallible addresses [ as in the case of TF1 / Viapresse, NDR ]. Remember, OWASP , an independent organization dedicated to IT security, classified in its top 10 SQL injections as the first plague web applications.",http://www.zataz.com/10-millions-de-donnees-volees-a-orange-espagne/#axzz3Nr3klnlH,1/5/2015,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2015-016,WHID: 2015-016: 10 million customer data stolen from Orange Spain,"To achieve this flight, hackers exploited a flaw, a SQL injection via two different reticular fallible addresses [ as in the case of TF1 / Viapresse, NDR ]. Remember, OWASP , an independent organization dedicated to IT security, classified in its top 10 SQL injections as the first plague web applications.",http://www.zataz.com/10-millions-de-donnees-volees-a-orange-espagne/#axzz3Nr3klnlH,1/5/2015,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2015-017,"WHID 2015-017: News websites, Twitter feeds hacked with pro-ISIS message","A group calling itself the ""CyberCaliphate"" took over the Twitter feeds of two American news outlets Tuesday, in addition to the website of a Maryland-based TV news station.",http://www.cbsnews.com/news/albuquerque-journal-wboc-websites-twitter-feeds-hacked-with-pro-isis-message/,1/6/2015,Brute Force,Insufficient Anti-Automation,Account Takeover,Social,,,,,,,,,,
-2015-017,"WHID 2015-017: News websites, Twitter feeds hacked with pro-ISIS message","A group calling itself the ""CyberCaliphate"" took over the Twitter feeds of two American news outlets Tuesday, in addition to the website of a Maryland-based TV news station.",http://www.cbsnews.com/news/albuquerque-journal-wboc-websites-twitter-feeds-hacked-with-pro-isis-message/,1/6/2015,Brute Force,Insufficient Anti-Automation,Account Takeover,Social,,,,,,,,,,
-2015-018,WHID 2015-018: More EC-Council Sub-Domains Defaced,Two more EC-Council sub-domains have been defaced by the hacking group known as Indonesian Gantengers Crew.,http://www.batblue.com/more-ec-council-sub-domains-defaced/,1/6/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-018,WHID 2015-018: More EC-Council Sub-Domains Defaced,Two more EC-Council sub-domains have been defaced by the hacking group known as Indonesian Gantengers Crew.,http://www.batblue.com/more-ec-council-sub-domains-defaced/,1/6/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-019,WHID 2015-019: Islamic extremists hack websites of primary school and church in Yorkshire,Islamic extremists have hacked the websites of a primary school and a church and replaced their homepages with a hate message against the US and Israel.,http://www.dailymail.co.uk/news/article-2898635/Islamic-extremists-hack-websites-primary-school-church-Yorkshire-replace-homepages-hate-message-against-U-S-Israel.html,1/6/2015,Unknown,Unknown,Defacement,Education,,,,,,,,,,
-2015-019,WHID 2015-019: Islamic extremists hack websites of primary school and church in Yorkshire,Islamic extremists have hacked the websites of a primary school and a church and replaced their homepages with a hate message against the US and Israel.,http://www.dailymail.co.uk/news/article-2898635/Islamic-extremists-hack-websites-primary-school-church-Yorkshire-replace-homepages-hate-message-against-U-S-Israel.html,1/6/2015,Unknown,Unknown,Defacement,Education,,,,,,,,,,
-2015-020,WHID 2015-020: Banque Cantonale de Geneve (BCGE) hacked by Rex Mundi,"Hackers operating under the handle of Rex Mundi have claimed that they hacked into the systems of Banque Cantonale de Geneve (BCGE) and stolen the banks customer information including private emails. Now the hackers are demanding ?10,000 for not making the data public.",http://www.techworm.net/2015/01/banque-cantonale-de-geneve-bcge-hacked-rex-mundi-demand-ransom.html,1/9/2015,SQL Injection,Improper Input Handling,Leakage of Information,Finance,,,,,,,,,,
-2015-020,WHID 2015-020: Banque Cantonale de Geneve (BCGE) hacked by Rex Mundi,"Hackers operating under the handle of Rex Mundi have claimed that they hacked into the systems of Banque Cantonale de Geneve (BCGE) and stolen the banks customer information including private emails. Now the hackers are demanding ?10,000 for not making the data public.",http://www.techworm.net/2015/01/banque-cantonale-de-geneve-bcge-hacked-rex-mundi-demand-ransom.html,1/9/2015,SQL Injection,Improper Input Handling,Leakage of Information,Finance,,,,,,,,,,
-2015-021,WHID 2015-021: CyberBerkut committed DDoS attack on the parliament website,The Internet pages of German Chancellor Angela Merkel and the German Bundestag are obviously crippled by an attack from the Internet.,http://www.zeit.de/digital/internet/2015-01/bundestag-bundeskanzlerin-cyberberkut-angriff-webseiten,1/7/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,,,,,,,,
-2015-021,WHID 2015-021: CyberBerkut committed DDoS attack on the parliament website,The Internet pages of German Chancellor Angela Merkel and the German Bundestag are obviously crippled by an attack from the Internet.,http://www.zeit.de/digital/internet/2015-01/bundestag-bundeskanzlerin-cyberberkut-angriff-webseiten,1/7/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Government,,,,,,,,,,
-2015-022,WHID 2015-022: U. of Hawaii and Cornell University hacked,"The U. of Hawaii data dump, which DataBreaches.net is not linking to, does not contain student or employee personal information, but in addition to acquiring the root username/password, ?Attorney? also got the mac addresses, service tags, usernames and more of each and every computer/smart board in their University. The dump only contained approximately 2,000 of the 65,000 lines of data he acquired, he tells this site",http://www.databreaches.net/u-of-hawaii-and-cornell-university-hacked-by-marxistattorney/,1/7/2015,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2015-022,WHID 2015-022: U. of Hawaii and Cornell University hacked,"The U. of Hawaii data dump, which DataBreaches.net is not linking to, does not contain student or employee personal information, but in addition to acquiring the root username/password, ?Attorney? also got the mac addresses, service tags, usernames and more of each and every computer/smart board in their University. The dump only contained approximately 2,000 of the 65,000 lines of data he acquired, he tells this site",http://www.databreaches.net/u-of-hawaii-and-cornell-university-hacked-by-marxistattorney/,1/7/2015,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2015-023,"WHID 2015-023: 8chan, related sites go down in Lizard Squad-powered DDoS","On Thursday, the recent Lizard Squad tour of Internet infamy continued as the hacking group took credit for a distributed denial of service (DDoS) attack against the imageboard site 8chan.",http://arstechnica.com/security/2015/01/8chan-related-sites-go-down-in-lizard-squad-powered-ddos/,1/8/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Social,,,,,,,,,,
-2015-023,"WHID 2015-023: 8chan, related sites go down in Lizard Squad-powered DDoS","On Thursday, the recent Lizard Squad tour of Internet infamy continued as the hacking group took credit for a distributed denial of service (DDoS) attack against the imageboard site 8chan.",http://arstechnica.com/security/2015/01/8chan-related-sites-go-down-in-lizard-squad-powered-ddos/,1/8/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Social,,,,,,,,,,
-2015-024,WHID 2015-024: Did you visit HuffPo last week? You might have a virus,"This past week, The Huffington Post and several major websites displayed malware-laced advertisements that infected computers and locked them down.",http://money.cnn.com/2015/01/08/technology/security/malvertising-huffington-post/,1/8/2015,Unknown,Unknown,Planting of Malware,Media,,,,,,,,,,
-2015-024,WHID 2015-024: Did you visit HuffPo last week? You might have a virus,"This past week, The Huffington Post and several major websites displayed malware-laced advertisements that infected computers and locked them down.",http://money.cnn.com/2015/01/08/technology/security/malvertising-huffington-post/,1/8/2015,Unknown,Unknown,Planting of Malware,Media,,,,,,,,,,
-2015-025,WHID 2015-025: Extratorrent Down After Huge DDoS Attack,"xtraTorrent, one of the largest torrent sites on the Internet, remains down following a huge DDoS attack. The site's operators are working hard to mitigate the assault and hope to have the site back online soon.",https://torrentfreak.com/extratorrent-down-after-huge-ddos-attack-150112/,1/12/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Data Sharing,,,,,,,,,,
-2015-025,WHID 2015-025: Extratorrent Down After Huge DDoS Attack,"xtraTorrent, one of the largest torrent sites on the Internet, remains down following a huge DDoS attack. The site's operators are working hard to mitigate the assault and hope to have the site back online soon.",https://torrentfreak.com/extratorrent-down-after-huge-ddos-attack-150112/,1/12/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Data Sharing,,,,,,,,,,
-2015-026,WHID 2015-026: North Korean official news agency site serves malware,"Users who visited the site of the state-run North Korean news agency, to see the country?s response to the Sony hacking accusations or for other reasons, might want to scan their computers for malware.",http://www.pcworld.com/article/2868436/north-korean-official-news-agency-site-serves-malware.html,1/13/2015,Unknown,Unknown,Planting of Malware,Media,,,,,,,,,,
-2015-026,WHID 2015-026: North Korean official news agency site serves malware,"Users who visited the site of the state-run North Korean news agency, to see the country?s response to the Sony hacking accusations or for other reasons, might want to scan their computers for malware.",http://www.pcworld.com/article/2868436/north-korean-official-news-agency-site-serves-malware.html,1/13/2015,Unknown,Unknown,Planting of Malware,Media,,,,,,,,,,
-2015-027,WHID 2015-027: Anonymous claims first victim in 'Operation Charlie Hebdo',"Hacking collective Anonymous declared war on Islamic extremists after Wednesday's deadly attack on Paris-based satirical newspaper Charlie Hebdo, and the group has now claimed its first victim.",http://mashable.com/2015/01/10/anonymous-operation-charlie-hebdo/,1/10/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Media,,,,,,,,,,
-2015-027,WHID 2015-027: Anonymous claims first victim in 'Operation Charlie Hebdo',"Hacking collective Anonymous declared war on Islamic extremists after Wednesday's deadly attack on Paris-based satirical newspaper Charlie Hebdo, and the group has now claimed its first victim.",http://mashable.com/2015/01/10/anonymous-operation-charlie-hebdo/,1/10/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Media,,,,,,,,,,
-2015-028,WHID 2015-028: Bundaberg Library website used as hacker's billboard,POLICE are investigating after the Bundaberg Regional Libraries website was hacked by a Syrian activist.,http://www.news-mail.com.au/news/library-website-a-hackers-billboard/2508740/,1/13/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-028,WHID 2015-028: Bundaberg Library website used as hacker's billboard,POLICE are investigating after the Bundaberg Regional Libraries website was hacked by a Syrian activist.,http://www.news-mail.com.au/news/library-website-a-hackers-billboard/2508740/,1/13/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-029,"WHID 2015-029: CENTCOM Twitter account hacked, suspended","The Twitter account for U.S. Central Command was suspended Monday after it was hacked by ISIS sympathizers -- but no classified information was obtained and no military networks were compromised, defense officials said.",http://www.cnn.com/2015/01/12/politics/centcom-twitter-hacked-suspended/,1/12/2015,Brute Force,Insufficient Anti-Automation,Account Takeover,Social,,,,,,,,,,
-2015-029,"WHID 2015-029: CENTCOM Twitter account hacked, suspended","The Twitter account for U.S. Central Command was suspended Monday after it was hacked by ISIS sympathizers -- but no classified information was obtained and no military networks were compromised, defense officials said.",http://www.cnn.com/2015/01/12/politics/centcom-twitter-hacked-suspended/,1/12/2015,Brute Force,Insufficient Anti-Automation,Account Takeover,Social,,,,,,,,,,
-2015-030,"WHID 2015-030: Thousands of American and United airlines accounts hacked, with thieves booking dozens of free trips",The hackers stole usernames and passwords from a third party source and logged into thousands of accounts. The source of the leak is being investigated as the airlines work to pay back the hacked customers.,http://www.nydailynews.com/news/national/thousands-american-united-airlines-accounts-hacked-article-1.2075162,1/12/2015,SQL Injection,Improper Input Handling,Leakage of Information,Transportation,,,,,,,,,,
-2015-030,"WHID 2015-030: Thousands of American and United airlines accounts hacked, with thieves booking dozens of free trips",The hackers stole usernames and passwords from a third party source and logged into thousands of accounts. The source of the leak is being investigated as the airlines work to pay back the hacked customers.,http://www.nydailynews.com/news/national/thousands-american-united-airlines-accounts-hacked-article-1.2075162,1/12/2015,SQL Injection,Improper Input Handling,Leakage of Information,Transportation,,,,,,,,,,
-2015-031,WHID 2015-031: Crayola apologizes for Facebook page hack,The Crayola Facebook page was posting things far more risqu? than crayons this past weekend. Unknown hackers took control of the Crayola social media webpage and posted dozens of links to R-rated sites and sexual jokes.,http://www.usatoday.com/story/news/nation-now/2015/01/12/crayola-facebook-page-hack/21640887/,1/12/2015,Unknown,Unknown,Account Takeover,Social,,,,,,,,,,
-2015-031,WHID 2015-031: Crayola apologizes for Facebook page hack,The Crayola Facebook page was posting things far more risqu? than crayons this past weekend. Unknown hackers took control of the Crayola social media webpage and posted dozens of links to R-rated sites and sexual jokes.,http://www.usatoday.com/story/news/nation-now/2015/01/12/crayola-facebook-page-hack/21640887/,1/12/2015,Unknown,Unknown,Account Takeover,Social,,,,,,,,,,
-2015-032,"WHID 2015-032: Notepad++ Releases ?Je suis Charlie? Edition, Website Gets Defaced",The website of the open-source text editor Notepad++ has been defaced by an Islamist hacking group because the developer released a ?Je suis Charlie? edition of the software.,http://news.softpedia.com/news/Notepad-plus-plus-Releases-Je-suis-Charlie-Edition-Website-Gets-Defaced-469956.shtml,1/14/2015,Unknown,Unknown,Defacement,Technology,,,,,,,,,,
-2015-032,"WHID 2015-032: Notepad++ Releases ?Je suis Charlie? Edition, Website Gets Defaced",The website of the open-source text editor Notepad++ has been defaced by an Islamist hacking group because the developer released a ?Je suis Charlie? edition of the software.,http://news.softpedia.com/news/Notepad-plus-plus-Releases-Je-suis-Charlie-Edition-Website-Gets-Defaced-469956.shtml,1/14/2015,Unknown,Unknown,Defacement,Technology,,,,,,,,,,
-2015-033,WHID 2015-033: Boomerang Rentals Issues Statement Following Alleged Security Breach,"UK-based Boomerang Rentals, a videogame rental service, issued a statement Monday, January 12th, following earlier allegations that customer information had been compromised.",http://www.gamebrit.com/2015/01/12/boomerang-rentals-uk-issues-statement-following-alleged-hack-security-breach-game-rental/,1/12/2015,SQL Injection,Improper Input Handling,Leakage of Information,Gaming,,,,,,,,,,
-2015-033,WHID 2015-033: Boomerang Rentals Issues Statement Following Alleged Security Breach,"UK-based Boomerang Rentals, a videogame rental service, issued a statement Monday, January 12th, following earlier allegations that customer information had been compromised.",http://www.gamebrit.com/2015/01/12/boomerang-rentals-uk-issues-statement-following-alleged-hack-security-breach-game-rental/,1/12/2015,SQL Injection,Improper Input Handling,Leakage of Information,Gaming,,,,,,,,,,
-2015-034,WHID 2015-034: Payment cards targeted in attack on pet supplies website,Tennessee-based ValuePetSupplies.com is notifying several thousand customers that unauthorized persons accessed its servers and installed malicious files to capture personal information ? including payment card data ? entered into its website.,http://www.scmagazine.com/payment-cards-targeted-in-attack-on-pet-supplies-website/article/392821/,1/16/2015,Unknown,Unknown,Leakage of Information,Retail,,,,,,,,,,
-2015-034,WHID 2015-034: Payment cards targeted in attack on pet supplies website,Tennessee-based ValuePetSupplies.com is notifying several thousand customers that unauthorized persons accessed its servers and installed malicious files to capture personal information ? including payment card data ? entered into its website.,http://www.scmagazine.com/payment-cards-targeted-in-attack-on-pet-supplies-website/article/392821/,1/16/2015,Unknown,Unknown,Leakage of Information,Retail,,,,,,,,,,
-2015-035,WHID 2015-035: PasteBin DB Dump from lehlel.com,lehlel.com was hacked and DB dumped,http://pastebin.ca/2906107,1/14/2015,SQL Injection,Improper Input Handling,Leakage of Information,Social,,,,,,,,,,
-2015-035,WHID 2015-035: PasteBin DB Dump from lehlel.com,lehlel.com was hacked and DB dumped,http://pastebin.ca/2906107,1/14/2015,SQL Injection,Improper Input Handling,Leakage of Information,Social,,,,,,,,,,
-2015-036,WHID 2015-036: BigBlueInteractive Hacked,Zyklon dumpts DB,http://www.databreaches.net/and-then-i-stumbled-across-these-hacks-by-zyklon/,1/14/2015,SQL Injection,Improper Input Handling,Leakage of Information,Media,,,,,,,,,,
-2015-036,WHID 2015-036: BigBlueInteractive Hacked,Zyklon dumpts DB,http://www.databreaches.net/and-then-i-stumbled-across-these-hacks-by-zyklon/,1/14/2015,SQL Injection,Improper Input Handling,Leakage of Information,Media,,,,,,,,,,
-2015-037,WHID 2015-037: Aqua Marine Boat website hacked,DB dumped on PasteBin,http://pastebin.com/ApnT0YcX,1/13/2015,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2015-037,WHID 2015-037: Aqua Marine Boat website hacked,DB dumped on PasteBin,http://pastebin.com/ApnT0YcX,1/13/2015,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2015-038,"WHID 2015-038: 19,000 French websites hit by DDoS, defaced in wake of terror attack","Since the three day terror attack that started in France on January 7 with the attack on satirical newspaper Charlie Hebdo, 19,000 websites of French-based companies have been targeted by cyber attackers, AP reports.",http://www.net-security.org/secworld.php?id=17832,1/16/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Media,,,,,,,,,,
-2015-038,"WHID 2015-038: 19,000 French websites hit by DDoS, defaced in wake of terror attack","Since the three day terror attack that started in France on January 7 with the attack on satirical newspaper Charlie Hebdo, 19,000 websites of French-based companies have been targeted by cyber attackers, AP reports.",http://www.net-security.org/secworld.php?id=17832,1/16/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Media,,,,,,,,,,
-2015-039,WHID 2015-039: FREE SYRIAN HACKERS HACKS OHIO CITY?S WEBSITE,Free Syrian Hacker Dr.SHA6H hacked and defaced the official Ohio City Website of Perrysburg. He left a message to the defaced page with a message bashing the governments of the world for not solving the Syrian Crisis.,http://beforeitsnews.com/alternative/2015/01/free-syrian-hackers-hacks-ohio-citys-website-3094106.html,1/17/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-039,WHID 2015-039: FREE SYRIAN HACKERS HACKS OHIO CITY?S WEBSITE,Free Syrian Hacker Dr.SHA6H hacked and defaced the official Ohio City Website of Perrysburg. He left a message to the defaced page with a message bashing the governments of the world for not solving the Syrian Crisis.,http://beforeitsnews.com/alternative/2015/01/free-syrian-hackers-hacks-ohio-citys-website-3094106.html,1/17/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-040,WHID 2015-040: Hacker breached Metropolitan State University database with personal info,"In a campuswide e-mail Friday, interim president Devinder Malhotra wrote that a computer hacker apparently got ?unauthorized access? to the university database in mid-December, and that investigators are still trying to determine the scope of the data breach.",http://www.databreaches.net/mn-hacker-breached-metropolitan-state-university-database-with-pe-rsonal-info/,1/16/2015,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2015-040,WHID 2015-040: Hacker breached Metropolitan State University database with personal info,"In a campuswide e-mail Friday, interim president Devinder Malhotra wrote that a computer hacker apparently got ?unauthorized access? to the university database in mid-December, and that investigators are still trying to determine the scope of the data breach.",http://www.databreaches.net/mn-hacker-breached-metropolitan-state-university-database-with-pe-rsonal-info/,1/16/2015,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2015-041,WHID 2015-041: Lizard Lair Hacked,"Someone hacked LizardStresser[dot]su, the Web site the group uses to coordinate attacks and sell subscriptions to its attacks-for-hire service.",https://krebsonsecurity.com/2015/01/another-lizard-arrested-lizard-lair-hacked/,1/15/2015,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2015-041,WHID 2015-041: Lizard Lair Hacked,"Someone hacked LizardStresser[dot]su, the Web site the group uses to coordinate attacks and sell subscriptions to its attacks-for-hire service.",https://krebsonsecurity.com/2015/01/another-lizard-arrested-lizard-lair-hacked/,1/15/2015,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2015-042,WHID 2015-042: New York Post Confirms Twitter Accounts Were Hacked,The New York Post said its Twitter account was hacked after messages were posted citing bogus breaking news about U.S. interest-rate policy and China firing missiles on a U.S. Navy ship.,http://www.bloomberg.com/news/articles/2015-01-16/new-york-post-says-twitter-feed-hacked-after-fake-china-tweets,1/16/2015,Unknown,Unknown,Account Takeover,Social,,,,,,,,,,
-2015-042,WHID 2015-042: New York Post Confirms Twitter Accounts Were Hacked,The New York Post said its Twitter account was hacked after messages were posted citing bogus breaking news about U.S. interest-rate policy and China firing missiles on a U.S. Navy ship.,http://www.bloomberg.com/news/articles/2015-01-16/new-york-post-says-twitter-feed-hacked-after-fake-china-tweets,1/16/2015,Unknown,Unknown,Account Takeover,Social,,,,,,,,,,
-2015-043,"WHID 2015-043: Grill parts website experiences system intrusion, payment card breach","From January 2014 to October 2014, cardholder data was exposed on three separate occasions for various lengths of time due to a cyber attack against Barbecue Renew's web server.",http://www.scmagazine.com/grill-parts-website-experiences-system-intrusion-payment-card-breach/article/394116/,1/23/2015,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2015-043,"WHID 2015-043: Grill parts website experiences system intrusion, payment card breach","From January 2014 to October 2014, cardholder data was exposed on three separate occasions for various lengths of time due to a cyber attack against Barbecue Renew's web server.",http://www.scmagazine.com/grill-parts-website-experiences-system-intrusion-payment-card-breach/article/394116/,1/23/2015,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2015-044,WHID 2015-044: Virginia county website defaced with Islamic State message,"A Virginia county was the victim of a cyber attack where a group posted messages and videos praising ISIS, the rebel Islamic group that has leveled threats against the United States. - See more at: http://statescoop.com/virginia-county-website-defaced-islamic-state-messages/#sthash.C2MeEh4O.dpuf",http://statescoop.com/virginia-county-website-defaced-islamic-state-messages/,1/20/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-044,WHID 2015-044: Virginia county website defaced with Islamic State message,"A Virginia county was the victim of a cyber attack where a group posted messages and videos praising ISIS, the rebel Islamic group that has leveled threats against the United States. - See more at: http://statescoop.com/virginia-county-website-defaced-islamic-state-messages/#sthash.C2MeEh4O.dpuf",http://statescoop.com/virginia-county-website-defaced-islamic-state-messages/,1/20/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-045,WHID 2015-045: PowerPulse website hacked,DB dumped,http://siph0n.net/exploits.php?id=3653,1/16/2015,SQL Injection,Improper Input Handling,Leakage of Information,Media,,,,,,,,,,
-2015-045,WHID 2015-045: PowerPulse website hacked,DB dumped,http://siph0n.net/exploits.php?id=3653,1/16/2015,SQL Injection,Improper Input Handling,Leakage of Information,Media,,,,,,,,,,
-2015-046,WHID 2015-046: DDoS Attacks Slam Finnish Bank,Police in Finland are investigating a series of distributed denial-of-service attacks against the country's OP Pohjola financial services group that have intermittently shut down online banking and direct debit services,http://www.bankinfosecurity.com/ddos-attacks-slam-finnish-bank-a-7761,1/7/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Finance,,,,,,,,,,
-2015-046,WHID 2015-046: DDoS Attacks Slam Finnish Bank,Police in Finland are investigating a series of distributed denial-of-service attacks against the country's OP Pohjola financial services group that have intermittently shut down online banking and direct debit services,http://www.bankinfosecurity.com/ddos-attacks-slam-finnish-bank-a-7761,1/7/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Finance,,,,,,,,,,
-2015-047,WHID 2015-047: Road Transport Corporation website hacked,The official website of the Andhra Pradesh State Road Transport Corporation (APSRTC) was defaced by suspected hackers from Bangladesh on Sunday,http://timesofindia.indiatimes.com/city/hyderabad/Road-Transport-Corporation-website-hacked/articleshow/18012113.cms,1/14/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-047,WHID 2015-047: Road Transport Corporation website hacked,The official website of the Andhra Pradesh State Road Transport Corporation (APSRTC) was defaced by suspected hackers from Bangladesh on Sunday,http://timesofindia.indiatimes.com/city/hyderabad/Road-Transport-Corporation-website-hacked/articleshow/18012113.cms,1/14/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-048,WHID 2015-048: Govt sites hacked on eve of SC cybercrime hearing,"On the eve of the Supreme Court's hearing on the Anti-Cybercrime Act of 2012, hackers opposing the law defaced several government websites early Monday.",http://www.gmanetwork.com/news/story/290139/scitech/technology/govt-sites-hacked-on-eve-of-sc-cybercrime-hearing,1/14/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-048,WHID 2015-048: Govt sites hacked on eve of SC cybercrime hearing,"On the eve of the Supreme Court's hearing on the Anti-Cybercrime Act of 2012, hackers opposing the law defaced several government websites early Monday.",http://www.gmanetwork.com/news/story/290139/scitech/technology/govt-sites-hacked-on-eve-of-sc-cybercrime-hearing,1/14/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-049,WHID 2015-049: philsacra.ust.edu.ph website hacked,DB dump,http://siph0n.net/exploits.php?id=3654,1/17/2015,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2015-049,WHID 2015-049: philsacra.ust.edu.ph website hacked,DB dump,http://siph0n.net/exploits.php?id=3654,1/17/2015,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2015-050,"WHID 2015-050: Aussie Travel Cover hack exposes details of 770,000 customers","A major data breach has hit one of Australia's leading travel insurers, exposing details of three quarters of a million policy holders. But while the hack occurred last year, customers have remained in the dark.",http://www.cnet.com/au/news/aussie-travel-cover-hack-exposes-customer-details/,1/20/2015,SQL Injection,Improper Input Handling,Leakage of Information,Travel,,,,,,,,,,
-2015-050,"WHID 2015-050: Aussie Travel Cover hack exposes details of 770,000 customers","A major data breach has hit one of Australia's leading travel insurers, exposing details of three quarters of a million policy holders. But while the hack occurred last year, customers have remained in the dark.",http://www.cnet.com/au/news/aussie-travel-cover-hack-exposes-customer-details/,1/20/2015,SQL Injection,Improper Input Handling,Leakage of Information,Travel,,,,,,,,,,
-2015-051,WHID 2015-051: Alleged Islamic hackers target NZ websites,At least two New Zealand websites have been hacked and defaced by a group calling themselves the 'Team Muslim Cyberforce'.,http://www.stuff.co.nz/technology/digital-living/65198165/islamic-hackers-target-nz-websites,1/19/2015,Unknown,Unknown,Defacement,Non-Profit,,,,,,,,,,
-2015-051,WHID 2015-051: Alleged Islamic hackers target NZ websites,At least two New Zealand websites have been hacked and defaced by a group calling themselves the 'Team Muslim Cyberforce'.,http://www.stuff.co.nz/technology/digital-living/65198165/islamic-hackers-target-nz-websites,1/19/2015,Unknown,Unknown,Defacement,Non-Profit,,,,,,,,,,
-2015-052,WHID 2015-052: Russian Dating Site Topface Hacked for 20 Million User Names,"User names and e-mail addresses of 20 million visitors to a Russia-based online dating service have been hacked and offered for sale on a website, according to fraud-detection software-maker Easy Solutions Inc.",http://www.bloomberg.com/news/articles/2015-01-25/hacker-steals-20-million-passwords-from-unidentified-dating-site,1/25/2015,SQL Injection,Improper Input Handling,Leakage of Information,Social,,,,,,,,,,
-2015-052,WHID 2015-052: Russian Dating Site Topface Hacked for 20 Million User Names,"User names and e-mail addresses of 20 million visitors to a Russia-based online dating service have been hacked and offered for sale on a website, according to fraud-detection software-maker Easy Solutions Inc.",http://www.bloomberg.com/news/articles/2015-01-25/hacker-steals-20-million-passwords-from-unidentified-dating-site,1/25/2015,SQL Injection,Improper Input Handling,Leakage of Information,Social,,,,,,,,,,
-2015-053,WHID 2015-053: Le Monde hacked: 'Je ne suis pas Charlie' writes Syrian Electronic Army,"Hackers from the Syrian Electronic Army, which supports Syrian President Bashar al-Assad, broke into the Twitter account of Le Monde overnight, the newspaper confirmed on Wednesday.",http://www.telegraph.co.uk/news/worldnews/europe/france/11359732/Le-Monde-hacked-Je-ne-suis-pas-Charlie-writes-Syrian-Electronic-Army.html,1/21/2015,Unknown,Unknown,Account Takeover,Social,,,,,,,,,,
-2015-053,WHID 2015-053: Le Monde hacked: 'Je ne suis pas Charlie' writes Syrian Electronic Army,"Hackers from the Syrian Electronic Army, which supports Syrian President Bashar al-Assad, broke into the Twitter account of Le Monde overnight, the newspaper confirmed on Wednesday.",http://www.telegraph.co.uk/news/worldnews/europe/france/11359732/Le-Monde-hacked-Je-ne-suis-pas-Charlie-writes-Syrian-Electronic-Army.html,1/21/2015,Unknown,Unknown,Account Takeover,Social,,,,,,,,,,
-2015-054,WHID 2015-054: Ghana government websites targeted by hackers,"The majority of the Ghanaian government's websites, including its main site, have been hacked and are currently offline.",http://www.bbc.com/news/world-africa-30914000,1/21/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-054,WHID 2015-054: Ghana government websites targeted by hackers,"The majority of the Ghanaian government's websites, including its main site, have been hacked and are currently offline.",http://www.bbc.com/news/world-africa-30914000,1/21/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-055,WHID 2015-055: U. Chicago hacked,"It appears we should add the University of Chicago to schools hacked by Carbonic. And yes, chalk it up to another SQLi vulnerability.",http://www.databreaches.net/u-chicago-hacked-by-teamcarbonic-claim/,1/24/2015,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2015-055,WHID 2015-055: U. Chicago hacked,"It appears we should add the University of Chicago to schools hacked by Carbonic. And yes, chalk it up to another SQLi vulnerability.",http://www.databreaches.net/u-chicago-hacked-by-teamcarbonic-claim/,1/24/2015,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2015-056,WHID 2015-056: Nigeria: DHQ Blogsite Hacked,"The Defence Headquarters (DHQ)' information blog site, defenceinfo.mil.ng, that was hacked into in the early hours of Friday, 23 January, 2015 has been restored to full operation.",http://allafrica.com/stories/201501250109.html,1/24/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-056,WHID 2015-056: Nigeria: DHQ Blogsite Hacked,"The Defence Headquarters (DHQ)' information blog site, defenceinfo.mil.ng, that was hacked into in the early hours of Friday, 23 January, 2015 has been restored to full operation.",http://allafrica.com/stories/201501250109.html,1/24/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-057,WHID 2015-057: Government of Nepal /Nepal Department of Transportation Hacked,DB Dump,http://siph0n.net/exploits.php?id=3665,1/19/2015,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2015-057,WHID 2015-057: Government of Nepal /Nepal Department of Transportation Hacked,DB Dump,http://siph0n.net/exploits.php?id=3665,1/19/2015,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2015-058,WHID 2015-058: Bitcoin news website Coinfire and its Twitter account hacked,"?Well, looks like the XPY supporters got what they wanted. They logged in to our domain registrar account and had our domain taken away from us,? he added.",http://www.hackread.com/bitcoin-news-website-coinfire-website-twitter-hacked/,1/26/2015,DNS Hijacking,Insufficient Process Validation,Defacement,Media,,,,,,,,,,
-2015-058,WHID 2015-058: Bitcoin news website Coinfire and its Twitter account hacked,"?Well, looks like the XPY supporters got what they wanted. They logged in to our domain registrar account and had our domain taken away from us,? he added.",http://www.hackread.com/bitcoin-news-website-coinfire-website-twitter-hacked/,1/26/2015,DNS Hijacking,Insufficient Process Validation,Defacement,Media,,,,,,,,,,
-2015-059,WHID 2015-059: FreshFiction DB Dumped,DB Dump on PasteBin,http://pastebin.com/ZGfRR7mL,1/24/2015,SQL Injection,Improper Input Handling,Leakage of Information,Media,,,,,,,,,,
-2015-059,WHID 2015-059: FreshFiction DB Dumped,DB Dump on PasteBin,http://pastebin.com/ZGfRR7mL,1/24/2015,SQL Injection,Improper Input Handling,Leakage of Information,Media,,,,,,,,,,
-2015-060,WHID 2015-060: ValidDumps.RU Full User Database Dump,DB Dump,http://siph0n.net/exploits.php?id=3668,1/22/2015,SQL Injection,Improper Input Handling,Leakage of Information,Hacker Site,,,,,,,,,,
-2015-060,WHID 2015-060: ValidDumps.RU Full User Database Dump,DB Dump,http://siph0n.net/exploits.php?id=3668,1/22/2015,SQL Injection,Improper Input Handling,Leakage of Information,Hacker Site,,,,,,,,,,
-2015-061,WHID 2015-061: Malaysia Airlines website hacked by 'Cyber Caliphate',"In a post on its Facebook account, the airline denied its internal servers, which contain passenger information, had been compromised. It said its Domain Name System (DNS) had instead been hijacked, with users redirected to the hackers' website.",http://www.cnn.com/2015/01/25/asia/malaysia-airlines-website-hacked/,1/26/2015,DNS Hijacking,Insufficient Process Validation,Defacement,Transportation,,,,,,,,,,
-2015-061,WHID 2015-061: Malaysia Airlines website hacked by 'Cyber Caliphate',"In a post on its Facebook account, the airline denied its internal servers, which contain passenger information, had been compromised. It said its Domain Name System (DNS) had instead been hijacked, with users redirected to the hackers' website.",http://www.cnn.com/2015/01/25/asia/malaysia-airlines-website-hacked/,1/26/2015,DNS Hijacking,Insufficient Process Validation,Defacement,Transportation,,,,,,,,,,
-2015-062,WHID 2015-062: oklahomacounty.org hacked,DB Dump on PasteBin,http://pastebin.com/0ekAGZWs,1/25/2015,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2015-062,WHID 2015-062: oklahomacounty.org hacked,DB Dump on PasteBin,http://pastebin.com/0ekAGZWs,1/25/2015,SQL Injection,Improper Input Handling,Leakage of Information,Government,,,,,,,,,,
-2015-063,WHID 2015-063: Victor Valley College hit by computer security breach,"The entire Victor Valley College Information Technology Department has been placed on paid administrative leave while campus police and an outside company investigate a breach in security protocol, President Roger Wagner said Thursday.",http://www.databreaches.net/ca-victor-valley-college-hit-by-computer-security-breach-entire-it-dept-put-on-leave/,1/31/2015,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2015-063,WHID 2015-063: Victor Valley College hit by computer security breach,"The entire Victor Valley College Information Technology Department has been placed on paid administrative leave while campus police and an outside company investigate a breach in security protocol, President Roger Wagner said Thursday.",http://www.databreaches.net/ca-victor-valley-college-hit-by-computer-security-breach-entire-it-dept-put-on-leave/,1/31/2015,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2015-064,WHID 2015-064: Rex Mundi dumps more data after another entity doesn?t pay extortion demands,"Last week, we hacked the servers of Temporis, allegedly France?s largest network of franchised temp work agencies (www.temporis-franchise.fr).",http://www.databreaches.net/rex-mundi-dumps-more-data-after-another-entity-doesnt-pay-extortion-demands/,1/27/2015,SQL Injection,Improper Input Handling,Leakage of Information,Recruiting,,,,,,,,,,
-2015-064,WHID 2015-064: Rex Mundi dumps more data after another entity doesn?t pay extortion demands,"Last week, we hacked the servers of Temporis, allegedly France?s largest network of franchised temp work agencies (www.temporis-franchise.fr).",http://www.databreaches.net/rex-mundi-dumps-more-data-after-another-entity-doesnt-pay-extortion-demands/,1/27/2015,SQL Injection,Improper Input Handling,Leakage of Information,Recruiting,,,,,,,,,,
-2015-065,WHID 2015-065: Taylor Swift hacked on Twitter and Instagram,Taylor Swift may be the victim of a recent hack on both of her confirmed Twitter and Instagram accounts. The now-deleted tweets tag Twitter users @Veriuser and @Lizzard and encourages her fans to follow them.,http://mashable.com/2015/01/27/taylor-swift-hack/,1/27/2015,Unknown,Unknown,Account Takeover,Social,,,,,,,,,,
-2015-065,WHID 2015-065: Taylor Swift hacked on Twitter and Instagram,Taylor Swift may be the victim of a recent hack on both of her confirmed Twitter and Instagram accounts. The now-deleted tweets tag Twitter users @Veriuser and @Lizzard and encourages her fans to follow them.,http://mashable.com/2015/01/27/taylor-swift-hack/,1/27/2015,Unknown,Unknown,Account Takeover,Social,,,,,,,,,,
-2015-066,WHID 2015-066: Top adult site xhamster victim of large malvertising campaign,"We are observing a particular large malvertising campaign in progress from popular adult site xhamster[.]com, a site that boasts half a billion visits a month.",https://blog.malwarebytes.org/exploits-2/2015/01/top-adult-site-xhamster-victim-of-large-malvertising-campaign/,1/27/2015,Unknown,Unknown,Planting of Malware,Adult,,,,,,,,,,
-2015-066,WHID 2015-066: Top adult site xhamster victim of large malvertising campaign,"We are observing a particular large malvertising campaign in progress from popular adult site xhamster[.]com, a site that boasts half a billion visits a month.",https://blog.malwarebytes.org/exploits-2/2015/01/top-adult-site-xhamster-victim-of-large-malvertising-campaign/,1/27/2015,Unknown,Unknown,Planting of Malware,Adult,,,,,,,,,,
-2015-067,WHID 2015-067: Some University of Washington websites hacked,"A group of University of Washington websites was hacked Thursday morning, and pages were replaced by an extremist message that promised death to Americans in Iraq.",http://q13fox.com/2015/01/29/some-university-of-washington-websites-hacked-extremist-group-claims-responsibility/,1/27/2015,Unknown,Unknown,Defacement,Education,,,,,,,,,,
-2015-067,WHID 2015-067: Some University of Washington websites hacked,"A group of University of Washington websites was hacked Thursday morning, and pages were replaced by an extremist message that promised death to Americans in Iraq.",http://q13fox.com/2015/01/29/some-university-of-washington-websites-hacked-extremist-group-claims-responsibility/,1/27/2015,Unknown,Unknown,Defacement,Education,,,,,,,,,,
-2015-068,WHID 2015-068: Higher Education Commission Pakistan Hacked,DB Dump,http://siph0n.net/exploits.php?id=3670,1/29/2015,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2015-068,WHID 2015-068: Higher Education Commission Pakistan Hacked,DB Dump,http://siph0n.net/exploits.php?id=3670,1/29/2015,SQL Injection,Improper Input Handling,Leakage of Information,Education,,,,,,,,,,
-2015-069,WHID 2015-069: Website of Bulgaria's Energy Watchdog Hacked,"Hackers have taken down the website of DKEVR, the Bulgarian energy regulator. - See more at: http://www.novinite.com/articles/165828/Website+of+Bulgaria%27s+Energy+Watchdog+Hacked#sthash.zKOcddf7.dpuf",http://www.novinite.com/articles/165828/Website+of+Bulgaria%27s+Energy+Watchdog+Hacked,1/8/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-069,WHID 2015-069: Website of Bulgaria's Energy Watchdog Hacked,"Hackers have taken down the website of DKEVR, the Bulgarian energy regulator. - See more at: http://www.novinite.com/articles/165828/Website+of+Bulgaria%27s+Energy+Watchdog+Hacked#sthash.zKOcddf7.dpuf",http://www.novinite.com/articles/165828/Website+of+Bulgaria%27s+Energy+Watchdog+Hacked,1/8/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-070,WHID 2015-070: Women's Resource Centre website hacked by people claiming to support Isis,"After the hacking last week, the umbrella body has been unable to restore its website to working order, and does not know why it has been targeted",http://www.thirdsector.co.uk/womens-resource-centre-website-hacked-people-claiming-support-isis/communications/article/1331684,1/30/2015,Unknown,Unknown,Defacement,Politics,,,,,,,,,,
-2015-070,WHID 2015-070: Women's Resource Centre website hacked by people claiming to support Isis,"After the hacking last week, the umbrella body has been unable to restore its website to working order, and does not know why it has been targeted",http://www.thirdsector.co.uk/womens-resource-centre-website-hacked-people-claiming-support-isis/communications/article/1331684,1/30/2015,Unknown,Unknown,Defacement,Politics,,,,,,,,,,
-2015-071,WHID 2015-071: PhonCert Hacked,DB Dump,http://siph0n.net/exploits.php?id=3676,1/31/2015,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,,,,,,,,,,
-2015-071,WHID 2015-071: PhonCert Hacked,DB Dump,http://siph0n.net/exploits.php?id=3676,1/31/2015,SQL Injection,Improper Input Handling,Leakage of Information,Entertainment,,,,,,,,,,
-2015-072,"WHID 2015-072: Culture Ministry website hacked by ""Bad Piggies""","The official website of the Cultural Ministry was still off the air on Wednesday, as police continued to hunt for hackers who tampered with the website yesterday and again today.",http://www.nationmultimedia.com/national/Culture-Ministry-website-hacked-by-Bad-Piggies-30198031.html,1/16/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-072,"WHID 2015-072: Culture Ministry website hacked by ""Bad Piggies""","The official website of the Cultural Ministry was still off the air on Wednesday, as police continued to hunt for hackers who tampered with the website yesterday and again today.",http://www.nationmultimedia.com/national/Culture-Ministry-website-hacked-by-Bad-Piggies-30198031.html,1/16/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-073,WHID 2015-073: EMG website hacked by Red Army,"The webpage, http://news-eleven.com, of Eleven Media Group has today been hacked by Red Army (a combination of six different hacker groups namely Blink Hacker Group, Myanmar Hack3rs Unite4m, Myanmar Cyber Army, Black Hack Area, Myanmar Cyber Defence Army, and Cyber Vampire Team).",http://www.nationmultimedia.com/breakingnews/EMG-website-hacked-by-Red-Army-30198022.html,1/16/2015,Unknown,Unknown,Defacement,Media,,,,,,,,,,
-2015-073,WHID 2015-073: EMG website hacked by Red Army,"The webpage, http://news-eleven.com, of Eleven Media Group has today been hacked by Red Army (a combination of six different hacker groups namely Blink Hacker Group, Myanmar Hack3rs Unite4m, Myanmar Cyber Army, Black Hack Area, Myanmar Cyber Defence Army, and Cyber Vampire Team).",http://www.nationmultimedia.com/breakingnews/EMG-website-hacked-by-Red-Army-30198022.html,1/16/2015,Unknown,Unknown,Defacement,Media,,,,,,,,,,
-2015-074,WHID 2015-074: Hackers Disrupt Mexican Defense Ministry?s Website,"Hackers claimed a cyberattack on the Mexican defense ministry website on Jan. 16, posting a manifesto from the Zapatista rebel group for two hours.",http://www.defensenews.com/article/20130117/DEFREG02/301170013/Hackers-Disrupt-Mexican-Defense-Ministry-8217-s-Website?odyssey=nav%7Chead,1/17/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-074,WHID 2015-074: Hackers Disrupt Mexican Defense Ministry?s Website,"Hackers claimed a cyberattack on the Mexican defense ministry website on Jan. 16, posting a manifesto from the Zapatista rebel group for two hours.",http://www.defensenews.com/article/20130117/DEFREG02/301170013/Hackers-Disrupt-Mexican-Defense-Ministry-8217-s-Website?odyssey=nav%7Chead,1/17/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-075,"WHID 2015-075: Phys.Org Hacked, serving up malware","Phys.Org admitted it was hacked, but says there is no threat. Chrome and Firefox via Google are blocking the malware ""attack"" site, but Bing and IE do nothing to warn users that ""this site may harm your computer.""",http://www.networkworld.com/article/2223853/microsoft-subnet/phys-org-hacked--serving-up-malware--google-blocks-site--but-bing-doesn-t.html,1/16/2015,Unknown,Unknown,Planting of Malware,Education,,,,,,,,,,
-2015-075,"WHID 2015-075: Phys.Org Hacked, serving up malware","Phys.Org admitted it was hacked, but says there is no threat. Chrome and Firefox via Google are blocking the malware ""attack"" site, but Bing and IE do nothing to warn users that ""this site may harm your computer.""",http://www.networkworld.com/article/2223853/microsoft-subnet/phys-org-hacked--serving-up-malware--google-blocks-site--but-bing-doesn-t.html,1/16/2015,Unknown,Unknown,Planting of Malware,Education,,,,,,,,,,
-2015-076,WHID 2015-076: Altech website hacked,Australian distributor Altech Computers fell victim to a hacking attack on Sunday after attackers gained access to a page on the company?s website and uploaded images of a pornographic nature.,"http://www.crn.com.au/News/329486,altech-website-hacked-replaced-with-porn.aspx",1/21/2015,Unknown,Unknown,Defacement,Technology,,,,,,,,,,
-2015-076,WHID 2015-076: Altech website hacked,Australian distributor Altech Computers fell victim to a hacking attack on Sunday after attackers gained access to a page on the company?s website and uploaded images of a pornographic nature.,"http://www.crn.com.au/News/329486,altech-website-hacked-replaced-with-porn.aspx",1/21/2015,Unknown,Unknown,Defacement,Technology,,,,,,,,,,
-2015-077,WHID 2015-077: Metropolitan Bank website hacked,"We?re gathering that the websites belonging to Zimbabwean bank, Metropolitan Bank (www.metbank.co.zw) was defaced and subsequently taken down ?for maintenance?. - See more at: http://www.techzim.co.zw/2013/01/metropolitan-bank-website-hacked/#sthash.9ykIzLxt.dpuf",http://www.techzim.co.zw/2013/01/metropolitan-bank-website-hacked/,1/21/2015,Unknown,Unknown,Defacement,Finance,,,,,,,,,,
-2015-077,WHID 2015-077: Metropolitan Bank website hacked,"We?re gathering that the websites belonging to Zimbabwean bank, Metropolitan Bank (www.metbank.co.zw) was defaced and subsequently taken down ?for maintenance?. - See more at: http://www.techzim.co.zw/2013/01/metropolitan-bank-website-hacked/#sthash.9ykIzLxt.dpuf",http://www.techzim.co.zw/2013/01/metropolitan-bank-website-hacked/,1/21/2015,Unknown,Unknown,Defacement,Finance,,,,,,,,,,
-2015-078,WHID 2015-078: UNSW confirms hacking breach,"The University of NSW has been the target of a ""concerted effort"" to hack its systems in December and January forcing the shutdown of 25 of its servers, a spokesman confirmed.",http://www.theage.com.au/it-pro/security-it/unsw-confirms-hacking-breach-20130121-2d272.html,1/21/2015,Unknown,Unknown,Downtime,Education,,,,,,,,,,
-2015-078,WHID 2015-078: UNSW confirms hacking breach,"The University of NSW has been the target of a ""concerted effort"" to hack its systems in December and January forcing the shutdown of 25 of its servers, a spokesman confirmed.",http://www.theage.com.au/it-pro/security-it/unsw-confirms-hacking-breach-20130121-2d272.html,1/21/2015,Unknown,Unknown,Downtime,Education,,,,,,,,,,
-2015-079,WHID 2015-079: Hackers steal thousands from Vancouver church,It?s very likely that hackers were simply using a banking trojan in a consumer-focused info-stealing campaign and just happened to ensnare the church?s account details from the home computer.,http://www.infosecurity-magazine.com/news/hackers-steal-thousands-from-vancouver-church/,1/22/2015,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,,,,,,,,,,
-2015-079,WHID 2015-079: Hackers steal thousands from Vancouver church,It?s very likely that hackers were simply using a banking trojan in a consumer-focused info-stealing campaign and just happened to ensnare the church?s account details from the home computer.,http://www.infosecurity-magazine.com/news/hackers-steal-thousands-from-vancouver-church/,1/22/2015,Banking Trojan,Insufficient Process Validation,Monetary Loss,Finance,,,,,,,,,,
-2015-080,WHID 2015-080: Sri Lanka govt Web sites hit in spate of attacks,"A hacker on Tuesday breached the Web site of Sri Lanka Port Authority (SLPA), and also attacked and leaked the Web sites of two Sri Lankan TV channels and the Bureau of Foreign Employment over the last weekend.",http://www.zdnet.com/article/sri-lanka-govt-web-sites-hit-in-spate-of-attacks/,1/23/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-080,WHID 2015-080: Sri Lanka govt Web sites hit in spate of attacks,"A hacker on Tuesday breached the Web site of Sri Lanka Port Authority (SLPA), and also attacked and leaked the Web sites of two Sri Lankan TV channels and the Bureau of Foreign Employment over the last weekend.",http://www.zdnet.com/article/sri-lanka-govt-web-sites-hit-in-spate-of-attacks/,1/23/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-081,WHID 2015-081: More Zimbabwean bank websites hacked,"Metropolitan Bank, the hacking of whose website we reported here two days ago, were not the only local financial institution to suffer at the hands of site defacers in the past couple of weeks. - See more at: http://www.techzim.co.zw/2013/01/more-zimbabwean-bank-websites-hacked-mbca-tetrad-and-others/#sthash.DMxZ56S1.dpuf",http://www.techzim.co.zw/2013/01/more-zimbabwean-bank-websites-hacked-mbca-tetrad-and-others/,1/24/2015,Unknown,Unknown,Defacement,Finance,,,,,,,,,,
-2015-081,WHID 2015-081: More Zimbabwean bank websites hacked,"Metropolitan Bank, the hacking of whose website we reported here two days ago, were not the only local financial institution to suffer at the hands of site defacers in the past couple of weeks. - See more at: http://www.techzim.co.zw/2013/01/more-zimbabwean-bank-websites-hacked-mbca-tetrad-and-others/#sthash.DMxZ56S1.dpuf",http://www.techzim.co.zw/2013/01/more-zimbabwean-bank-websites-hacked-mbca-tetrad-and-others/,1/24/2015,Unknown,Unknown,Defacement,Finance,,,,,,,,,,
-2015-082,"WHID 2015-082: Capital One Website Disrupted, Cyber Protestors Claim Attack","The website for Capital One was inaccessible for online banking customers for hours overnight, possibly the latest salvo in a long-running cyber protest targeting major Western financial institutions over an anti-Islam movie.",http://abcnews.go.com/blogs/headlines/2013/01/capital-one-website-disrupted-cyber-protestors-claim-attack/,1/24/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Finance,,,,,,,,,,
-2015-082,"WHID 2015-082: Capital One Website Disrupted, Cyber Protestors Claim Attack","The website for Capital One was inaccessible for online banking customers for hours overnight, possibly the latest salvo in a long-running cyber protest targeting major Western financial institutions over an anti-Islam movie.",http://abcnews.go.com/blogs/headlines/2013/01/capital-one-website-disrupted-cyber-protestors-claim-attack/,1/24/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Finance,,,,,,,,,,
-2015-083,WHID 2015-083: Web server hackers install rogue Apache modules and SSH backdoors,A group of hackers that are infecting Web servers with rogue Apache modules are also backdooring their SSH (Secure Shell) services in order to steal login credentials from administrators and users.,http://www.infoworld.com/article/2612975/hacking/web-server-hackers-install-rogue-apache-modules-and-ssh-backdoors--researchers-say.html,1/24/2015,Unknown,Unknown,Planting of Malware,Multiple,,,,,,,,,,
-2015-083,WHID 2015-083: Web server hackers install rogue Apache modules and SSH backdoors,A group of hackers that are infecting Web servers with rogue Apache modules are also backdooring their SSH (Secure Shell) services in order to steal login credentials from administrators and users.,http://www.infoworld.com/article/2612975/hacking/web-server-hackers-install-rogue-apache-modules-and-ssh-backdoors--researchers-say.html,1/24/2015,Unknown,Unknown,Planting of Malware,Multiple,,,,,,,,,,
-2015-084,"WHID 2015-084: After Ransom Request, Trading Firm Repelled Hacker Attacks","The last in a year-long series of hacker attacks on Henyep Capital Markets (UK) Ltd., an online trading platform, was quickly repelled last October",http://blogs.wsj.com/cio/2013/01/25/after-ransom-request-trading-firm-repelled-hacker-attacks/,1/25/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Finance,,,,,,,,,,
-2015-084,"WHID 2015-084: After Ransom Request, Trading Firm Repelled Hacker Attacks","The last in a year-long series of hacker attacks on Henyep Capital Markets (UK) Ltd., an online trading platform, was quickly repelled last October",http://blogs.wsj.com/cio/2013/01/25/after-ransom-request-trading-firm-repelled-hacker-attacks/,1/25/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Finance,,,,,,,,,,
-2015-085,WHID 2015-085: Texas Credit Union Hit by DDoS Attackers,"University Federal Credit Union, the $1.5 billion institution headquartered in Austin, Texas, confirmed Friday that it was taken down ?for around two and one-half hours? on Thursday in a cyber attack",http://www.cutimes.com/2013/01/25/texas-credit-union-hit-by-ddos-attackers?ref=hp,1/25/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Finance,,,,,,,,,,
-2015-085,WHID 2015-085: Texas Credit Union Hit by DDoS Attackers,"University Federal Credit Union, the $1.5 billion institution headquartered in Austin, Texas, confirmed Friday that it was taken down ?for around two and one-half hours? on Thursday in a cyber attack",http://www.cutimes.com/2013/01/25/texas-credit-union-hit-by-ddos-attackers?ref=hp,1/25/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Finance,,,,,,,,,,
-2015-086,WHID 2015-086: Buy Way Hit by Extortionist Rex Mundi Hackers,"Hacker group Rex Mundi, which recently attempted to extort $15,000 from AmeriCash Advance and $50,000 from Drake International, now claim to have breached the servers of Belgian company Buy Way",http://www.esecurityplanet.com/hackers/buy-way-hit-by-extortionist-rex-mundi-hackers.html,1/25/2015,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2015-086,WHID 2015-086: Buy Way Hit by Extortionist Rex Mundi Hackers,"Hacker group Rex Mundi, which recently attempted to extort $15,000 from AmeriCash Advance and $50,000 from Drake International, now claim to have breached the servers of Belgian company Buy Way",http://www.esecurityplanet.com/hackers/buy-way-hit-by-extortionist-rex-mundi-hackers.html,1/25/2015,SQL Injection,Improper Input Handling,Leakage of Information,Retail,,,,,,,,,,
-2015-087,"WHID 2015-087: Anonymous Hacks US Government Site, Threatens Supreme 'Warheads'","The hacktivist group Anonymous hacked the U.S. federal sentencing website early Saturday, using the page to make a brazen and boisterous declaration of ""war"" on the U.S. government.",http://mashable.com/2013/01/26/anonymous-hack-government-website-declares-war/,1/26/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-087,"WHID 2015-087: Anonymous Hacks US Government Site, Threatens Supreme 'Warheads'","The hacktivist group Anonymous hacked the U.S. federal sentencing website early Saturday, using the page to make a brazen and boisterous declaration of ""war"" on the U.S. government.",http://mashable.com/2013/01/26/anonymous-hack-government-website-declares-war/,1/26/2015,Unknown,Unknown,Defacement,Government,,,,,,,,,,
-2015-088,WHID 2015-088: Citizens Bank website brought down by Iranian hackers,"The bank's website was down on Thursday because of what the bank called ""a temporary disruption due to an unusually high volume of Internet traffic.""",http://www.wcvb.com/money/Citizens-Bank-website-brought-down-by-Iranian-hackers/18291048,1/26/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Finance,,,,,,,,,,
-2015-088,WHID 2015-088: Citizens Bank website brought down by Iranian hackers,"The bank's website was down on Thursday because of what the bank called ""a temporary disruption due to an unusually high volume of Internet traffic.""",http://www.wcvb.com/money/Citizens-Bank-website-brought-down-by-Iranian-hackers/18291048,1/26/2015,Denial of Service,Insufficient Anti-Automation,Downtime,Finance,,,,,,,,,,
-2015-089,WHID 2015-089: Rogue Payday loan brokers hacking websites to increase website traffic,An investigation by Sky News has revealed that some Payday loan brokers have been involved in hacking popular websites in order to increase their rankings on Google and the number of visitors to their sites,http://www.financialreporter.co.uk/finance-news/rogue-payday-loan-brokers-hacking-websites-to-increase-website-traffic.html,1/29/2015,Unknown,Unknown,SPAM Links,Multiple,,,,,,,,,,
-2015-089,WHID 2015-089: Rogue Payday loan brokers hacking websites to increase website traffic,An investigation by Sky News has revealed that some Payday loan brokers have been involved in hacking popular websites in order to increase their rankings on Google and the number of visitors to their sites,http://www.financialreporter.co.uk/finance-news/rogue-payday-loan-brokers-hacking-websites-to-increase-website-traffic.html,1/29/2015,Unknown,Unknown,SPAM Links,Multiple,,,,,,,,,,
-2015-090,"WHID 2015-090: RubyGems.org hacked, interrupting Heroku services and putting sites using Rails at risk","A user uploaded a malicious gem that contained a malicious gem manifest (YAML file). The manifest contained embedded Ruby with this payload. This is the only known incident involving this vulnerability, but the vulnerability involved is a remote code execution exploit, so the usual rules apply.",http://venturebeat.com/2013/01/30/rubygems-org-hacked-interrupting-heroku-services-and-putting-millions-of-sites-using-rails-at-risk/,1/30/2015,Code Injection,Improper Input Handling,Leakage of Information,Technology,,,,,,,,,,
-2015-090,"WHID 2015-090: RubyGems.org hacked, interrupting Heroku services and putting sites using Rails at risk","A user uploaded a malicious gem that contained a malicious gem manifest (YAML file). The manifest contained embedded Ruby with this payload. This is the only known incident involving this vulnerability, but the vulnerability involved is a remote code execution exploit, so the usual rules apply.",http://venturebeat.com/2013/01/30/rubygems-org-hacked-interrupting-heroku-services-and-putting-millions-of-sites-using-rails-at-risk/,1/30/2015,Code Injection,Improper Input Handling,Leakage of Information,Technology,,,,,,,,,,
-2-For a normal user coming from Google, they are redirected to a web site with malware or to another site for more spam.",http://blog.sucuri.net/2010/05/seo-spam-network-details-of-wp-includes.html,5/25/2010,Content Spoofing,Application Misconfiguration,Link Spam,Education,USA,No,,,,WordPress,,,,
-2-For a normal user coming from Google, they are redirected to a web site with malware or to another site for more spam.",http://blog.sucuri.net/2010/05/seo-spam-network-details-of-wp-includes.html,5/25/2010,Content Spoofing,Application Misconfiguration,Link Spam,Education,USA,No,,,,WordPress,,,,
-2. Register.com representative asks hacker to provide verification information. Hacker provides invalid information, but Register.com goes ahead and e-mails a security code to the email address it has on file for Baidu anyway.
-2) The reputable site name would allay fears of anything malicious lurking at the end of the click.
-3) Most URL filtering solutions would not block the initial request to cnn.com (although reputable solutions would have been updated in real time about the follow on link which would be blocked)",http://blog.commtouch.com/cafe/email-security-news/cnn-redirect-exploited-by-scammers/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+CommtouchCafe+(Commtouch+Caf??),4/6/2010,Redirection,Improper Input Handling,Link Spam,Media,USA,No,,,,,,,,
-3) Most URL filtering solutions would not block the initial request to cnn.com (although reputable solutions would have been updated in real time about the follow on link which would be blocked)",http://blog.commtouch.com/cafe/email-security-news/cnn-redirect-exploited-by-scammers/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+CommtouchCafe+(Commtouch+Caf??),4/6/2010,Redirection,Improper Input Handling,Link Spam,Media,USA,No,,,,,,,,
-3. The hacker doesn???t have access to that e-mail address, so he/she relays a bogus security code to the Register.com representative via chat. Baidu claims the representative didn???t bother to compare the code to the actual one.
-4. Hacker asks Register.com representative to change email address on file to antiwahabi2008@gmail.com, and representative does.
-5. Hacker now uses ???forgot password??? link at Register.com to request the username and password to the account. Hacker can then log in and change the name servers.",http://www.telegraph.co.uk/technology/news/6974129/Baidu-hacked-by-Iranian-Cyber-Army.html,1/12/2010,Weak Password Recovery Validation,Insufficient Process Validation,Downtime,Internet,China,No,,,Iran,,,,,http://domainnamewire.com/2010/02/24/how-baidu-got-hacked-by-the-iranian-cyber-army/
-5. Hacker now uses ???forgot password??? link at Register.com to request the username and password to the account. Hacker can then log in and change the name servers.",http://www.telegraph.co.uk/technology/news/6974129/Baidu-hacked-by-Iranian-Cyber-Army.html,1/12/2010,Weak Password Recovery Validation,Insufficient Process Validation,Downtime,Internet,China,No,,,Iran,,,,,http://domainnamewire.com/2010/02/24/how-baidu-got-hacked-by-the-iranian-cyber-army/
-According to administrative complaints issued by the FTC, the three resellers buy credit reports from the three nationwide consumer reporting agencies (Equifax, Experian, and TransUnion) and combine them into special reports they sell to mortgage brokers and others to determine consumers??? eligibility for credit. Due to their lack of information security policies and procedures, the companies allegedly allowed clients without basic security measures, such as firewalls and updated antivirus software, to access their reports. As a result, hackers accessed more than 1,800 credit reports without authorization via the clients??? computer networks. In addition, even after becoming aware of the data breaches, the companies did not make reasonable efforts to protect against future breaches.",http://www.ftc.gov/opa/2011/02/settlement.shtm,2/3/2011,Unknown,Insufficient Authorization,Leakage of Information,Finance,,No,,,,,,Credit Records,1800,
-According to administrative complaints issued by the FTC, the three resellers buy credit reports from the three nationwide consumer reporting agencies (Equifax, Experian, and TransUnion) and combine them into special reports they sell to mortgage brokers and others to determine consumers??? eligibility for credit. Due to their lack of information security policies and procedures, the companies allegedly allowed clients without basic security measures, such as firewalls and updated antivirus software, to access their reports. As a result, hackers accessed more than 1,800 credit reports without authorization via the clients??? computer networks. In addition, even after becoming aware of the data breaches, the companies did not make reasonable efforts to protect against future breaches.",http://www.ftc.gov/opa/2011/02/settlement.shtm,2/3/2011,Unknown,Insufficient Authorization,Leakage of Information,Finance,,No,,,,,,Credit Records,1800,
-According to a post on AbsolutePunk, somebody signed up for an account with Play MPE under false pretenses, claiming to be an Australian music critic. Then this person--apparently a teenage boy--figured out how to access music he wasn't entitled to, including upcoming releases by The Black Keys, Macy Gray, Hole, The Gaslight Anthem, and many other artists.
-According to a report posted by SecureWorks director of malware analysis Joe Stewart, the botnet created by the ""Vecebot"" Trojan comprises more than 15,000 bots, most of them in Vietnam.
-According to FMT's chief technical officer Thirun Nadason, the Distributed Denial of Service (DDOS) attack is believed to be the work of professionals.",http://www.freemalaysiatoday.com/fmt-english/news/general/10094-fmt-under-ddos-attack,9/9/2010,Denial of Service,Insufficient Anti-automation,Downtime,News,Malaysia,No,,,,,,,,
-According to FMT's chief technical officer Thirun Nadason, the Distributed Denial of Service (DDOS) attack is believed to be the work of professionals.",http://www.freemalaysiatoday.com/fmt-english/news/general/10094-fmt-under-ddos-attack,9/9/2010,Denial of Service,Insufficient Anti-automation,Downtime,News,Malaysia,No,,,,,,,,
-According to Heise Media, the flaw was originally discovered a year ago by another open source project, which uses the same component, but it escaped the OpenX developers when deciding to integrate it.
-According to media reports, the website was temporarily taken offline after the breach was discovered on the 8th February. A statement on the website said that as per its security guidelines and structures, it has a process in place for eventualities such as this.
-According to Melgar, the perpetrators who set up the bogus transactions had previously stolen a bank employee???s online login credentials after infecting the employee???s Microsoft Windows computer with a Trojan horse program. Melgar said investigators have not yet determined which particular strain of malware had infected the PC, adding that the bank???s installation of Symantec???s Norton Antivirus failed to detect the infection prior to the unauthorized transfers.",http://krebsonsecurity.com/2010/05/cyber-thieves-rob-treasury-credit-union/,5/20/2010,Banking Trojan,Insufficient Authentication,Monetary Loss,Government,USA,No,,,Ukraine,,,,,
-According to Melgar, the perpetrators who set up the bogus transactions had previously stolen a bank employee???s online login credentials after infecting the employee???s Microsoft Windows computer with a Trojan horse program. Melgar said investigators have not yet determined which particular strain of malware had infected the PC, adding that the bank???s installation of Symantec???s Norton Antivirus failed to detect the infection prior to the unauthorized transfers.",http://krebsonsecurity.com/2010/05/cyber-thieves-rob-treasury-credit-union/,5/20/2010,Banking Trojan,Insufficient Authentication,Monetary Loss,Government,USA,No,,,Ukraine,,,,,
-According to Microsoft, click fraud is an online advertising scam that occurs when a person or computer program imitates a legitimate user and clicks on an online ad for the purpose of generating a fraudulent ???charge-per-click,??? without having any interest in the ad.
-According to multiple postings on the Wordpress user forum and other blogs, the attack doesn???t modify or create files, but rather appears to inject a Web address ??? ???networkads.net/grep??? ??? directly into the target site???s database, so that any attempts to access the hacked site redirects the visitor to networkads.net. Worse yet, because of the way the attack is carried out, victim site owners are at least temporarily locked out of accessing their blogs from the Wordpress interface.
-According to one of the editors, who goes by the name Photayoke, the Web site came under major attacks on May 27 and June 11, following three smaller attacks.
-According to the report, the intruders used widely available attack methods known as SQL injection and spear phishing to compromise their targets. Once they gained access to computers on internal company networks, they would install remote administration software that gave them complete control of those systems. That made it possible for the intruders to search for documents as well as stage attacks on other computers connected to corporate networks.",http://www.nytimes.com/2011/02/10/business/global/10hack.html?_r=1,2/10/2011,SQL Injection,Improper Input Handling,Leakage of Information,Energy,,No,Night Dragon,5,China,,,,,
-According to the report, the intruders used widely available attack methods known as SQL injection and spear phishing to compromise their targets. Once they gained access to computers on internal company networks, they would install remote administration software that gave them complete control of those systems. That made it possible for the intruders to search for documents as well as stage attacks on other computers connected to corporate networks.",http://www.nytimes.com/2011/02/10/business/global/10hack.html?_r=1,2/10/2011,SQL Injection,Improper Input Handling,Leakage of Information,Energy,,No,Night Dragon,5,China,,,,,
-According to the state-run Korean Communications Commission ( KCC), the websites of government agencies, such as the presidential office Cheong Wa Dae, the Ministry of Foreign Affairs and Trade, and private firms, including the leading Internet search engine Naver, Nonghyup Bank and the Korean Exchange Bank, were hit by the so-called distributed denial-of-service (DDoS) attacks from around local time 6:00 p.m. (0900 GMT) Wednesday.",http://english.cri.cn/6966/2010/07/07/1461s581567.htm,7/7/2010,Denial of Service,Insufficient Anti-automation,Downtime,Government,South Korea,No,,,,,,,,
-According to the state-run Korean Communications Commission ( KCC), the websites of government agencies, such as the presidential office Cheong Wa Dae, the Ministry of Foreign Affairs and Trade, and private firms, including the leading Internet search engine Naver, Nonghyup Bank and the Korean Exchange Bank, were hit by the so-called distributed denial-of-service (DDoS) attacks from around local time 6:00 p.m. (0900 GMT) Wednesday.",http://english.cri.cn/6966/2010/07/07/1461s581567.htm,7/7/2010,Denial of Service,Insufficient Anti-automation,Downtime,Government,South Korea,No,,,,,,,,
-According to the Taipei Times, the Japanese government is investigating attacks directed at the Ministry of Defense and National Police Agency websites, between Wednesday and Friday.
-According to Thompson, Facebook eradicated the rogue application about 15 hours after the attack started. Facebook's only acknowledgment of the attack came on its security page, where a ""Tip of the Week"" Monday morning read: ""Don't click on suspicious-looking links, even if they've been sent or posted by friends.""",http://www.computerworld.com/s/article/9176905/Huge_sexiest_video_ever_attack_hits_Facebook,5/18/2010,Rogue 3rd Party App,Insufficient Process Validation,Planting of Malware,Web 2.0,USA,No,,,,Facebook,,,,
-According to Thompson, Facebook eradicated the rogue application about 15 hours after the attack started. Facebook's only acknowledgment of the attack came on its security page, where a ""Tip of the Week"" Monday morning read: ""Don't click on suspicious-looking links, even if they've been sent or posted by friends.""",http://www.computerworld.com/s/article/9176905/Huge_sexiest_video_ever_attack_hits_Facebook,5/18/2010,Rogue 3rd Party App,Insufficient Process Validation,Planting of Malware,Web 2.0,USA,No,,,,Facebook,,,,
-According Zataz, the hacker would be introduced through a security hole in the platform Waka , launched last week in partnership with the government . This ??? backdoor ???, which allowed anyone to edit the content of pages, had been quickly corrected.
-Accounts System indicating that his account details had been changed. He
-A computer screen displayed the message ???You have been hacked,??? Faust said. ???Since we don???t know one way or the other we sent notices out to 56,000 people that there???s a potential that the information was compromised.???
-A court heard she tried to set up her ex-boyfriend partner after accused him of raping her several times after the end of their five-year relationship in 2007.",http://www.telegraph.co.uk/technology/facebook/7685381/Facebook-hacker-jailed-after-falsely-accusing-boyfriend-of-rape.html,5/6/2010,Brute Force,Insufficient Authentication,Disinformation,Web 2.0,USA,No,,,USA,Facebook,,,,
-A court heard she tried to set up her ex-boyfriend partner after accused him of raping her several times after the end of their five-year relationship in 2007.",http://www.telegraph.co.uk/technology/facebook/7685381/Facebook-hacker-jailed-after-falsely-accusing-boyfriend-of-rape.html,5/6/2010,Brute Force,Insufficient Authentication,Disinformation,Web 2.0,USA,No,,,USA,Facebook,,,,
-A distributed denial of service attack, officially launched at midnight (Central European Time) on 7 October , crashed the organisation's website on Wednesday even before it even officially began. The assault is a repeat of tactics previously used against the websites of Recording Industry Association of America (RIAA), the Motion Picture Association of America (MPAA) and UK law firm ACS:Law, among others.",http://www.theregister.co.uk/2010/10/07/anonymous_ent_biz_ddos_hits_spain/,10/7/2010,Denial of Service,Insufficient Anti-automation,Downtime,Entertainment,Spain,Yes,Operation Payback,,,,,,,
-A distributed denial of service attack, officially launched at midnight (Central European Time) on 7 October , crashed the organisation's website on Wednesday even before it even officially began. The assault is a repeat of tactics previously used against the websites of Recording Industry Association of America (RIAA), the Motion Picture Association of America (MPAA) and UK law firm ACS:Law, among others.",http://www.theregister.co.uk/2010/10/07/anonymous_ent_biz_ddos_hits_spain/,10/7/2010,Denial of Service,Insufficient Anti-automation,Downtime,Entertainment,Spain,Yes,Operation Payback,,,,,,,
-Affected companies include Bloomberg, Volvo SA, Caledon Hotel Casino, Peugeot SA and Radio 786.
-A file named ???ballot.$(sleep 10)pdf,??? for instance, caused the server to pause for 10 seconds. They used similar techniques to install a backdoor on the system that allowed them almost unfettered system access.",http://www.theregister.co.uk/2010/10/06/net_voting_hacked/,10/6/2010,OS Commanding,Improper Input Handling,Defacement,Government,USA,No,,,USA,,,,,
-A file named ???ballot.$(sleep 10)pdf,??? for instance, caused the server to pause for 10 seconds. They used similar techniques to install a backdoor on the system that allowed them almost unfettered system access.",http://www.theregister.co.uk/2010/10/06/net_voting_hacked/,10/6/2010,OS Commanding,Improper Input Handling,Defacement,Government,USA,No,,,USA,,,,,
-A hacker wrote a script that repeatedly cast votes for one of the locations.",http://www.seattlepi.com/local/426071_dicks02.html,9/1/2010,Process Automation,Insufficient Anti-automation,Disinformation,Hospitality,"Washington, USA",No,,,,,,,,
-A hacker wrote a script that repeatedly cast votes for one of the locations.",http://www.seattlepi.com/local/426071_dicks02.html,9/1/2010,Process Automation,Insufficient Anti-automation,Disinformation,Hospitality,"Washington, USA",No,,,,,,,,
-Hundreds of Israeli web sites hacked in 'Propaganda War'
-Israeli bank site hacked by an Islamic group
-alert(""hacked! pakifix po yung blind sql po sa server nyo :D"");
-",,7/21/2008,SQL Injection,Improper Input Handling,Planting of Malware,Retail,USA,No,,,,,,,,
-",,7/21/2008,SQL Injection,Improper Input Handling,Planting of Malware,Retail,USA,No,,,,,,,,
-All of them had the following javascript added to their pages:
-All the sites infected are using the latest Wordpress version and had a PHP script injected inside their wp-includes directory. The script name is random and it does two things:
-Although BulletProof Networks chief operating officer (COO) Lorenzo Modesto first said that Whirlpool was the only one of its customers to be affected by the attack, he said later that its public and private managed cloud customers were experiencing intermittent degraded network performance also.",http://www.zdnet.com.au/whirlpool-hit-by-ddos-attack-339308730.htm,1/21/2011,Denial of Service,Insufficient Anti-automation,Downtime,Service Providers,Australia,No,,,,,,,,
-Although BulletProof Networks chief operating officer (COO) Lorenzo Modesto first said that Whirlpool was the only one of its customers to be affected by the attack, he said later that its public and private managed cloud customers were experiencing intermittent degraded network performance also.",http://www.zdnet.com.au/whirlpool-hit-by-ddos-attack-339308730.htm,1/21/2011,Denial of Service,Insufficient Anti-automation,Downtime,Service Providers,Australia,No,,,,,,,,
-Although some of the hacked websites were back online by afternoon, many websites were still down as of last night. Druknet???s web server, on which the websites are stored, was also taken offline periodically throughout yesterday.
-Although the names, dates of birth, addresses, Social Security numbers and medical procedure codes could have been accessed by the hackers, Don Wood, Seacoast Radiology???s business manager, has said that there has been no report of identity theft as a result of the hack.",http://www.dedicatedserverdir.com/news/ShowItem.aspx?ID=74516,1/17/2011,Unknown,Unknown,Leakage of Information,Health,"Rochester, New Hampshire",No,,,,,,,,
-Although the names, dates of birth, addresses, Social Security numbers and medical procedure codes could have been accessed by the hackers, Don Wood, Seacoast Radiology???s business manager, has said that there has been no report of identity theft as a result of the hack.",http://www.dedicatedserverdir.com/news/ShowItem.aspx?ID=74516,1/17/2011,Unknown,Unknown,Leakage of Information,Health,"Rochester, New Hampshire",No,,,,,,,,
-A message on the site said that it had been ""compromised by a security exploit"" but did not specify any further details.
-""A mischievous hacker friend of mine stepped in with a small script that he wrote that will check me in to any venue at all via the Foursquare API,"" Arrington wrote in a post on TechCrunch. ""That means I don't have to spend time finding friends already where I want to be, and since we're using the API we can easily fake out the ""you're not actually there"" problem.""",http://www.observer.com/print/133727,10/1/2010,Content Spoofing,Abuse of Functionality,Disinformation,Web 2.0,USA,No,,,,,,,,
-""A mischievous hacker friend of mine stepped in with a small script that he wrote that will check me in to any venue at all via the Foursquare API,"" Arrington wrote in a post on TechCrunch. ""That means I don't have to spend time finding friends already where I want to be, and since we're using the API we can easily fake out the ""you're not actually there"" problem.""",http://www.observer.com/print/133727,10/1/2010,Content Spoofing,Abuse of Functionality,Disinformation,Web 2.0,USA,No,,,,,,,,
-An ???autopsy??? showed a highly sophisticated hacker struck at 6:55 a.m., the group said, setting the stage for the eventual meltdown. The server was wiped out, though group officials said no data was lost or stolen.",http://blogs.wsj.com/washwire/2010/10/21/cyber-attack-strikes-freedomworks/,10/21/2010,Denial of Service,Insufficient Anti-automation,Downtime,Politics,"Washington, DC",No,,,,,,,,
-An ???autopsy??? showed a highly sophisticated hacker struck at 6:55 a.m., the group said, setting the stage for the eventual meltdown. The server was wiped out, though group officials said no data was lost or stolen.",http://blogs.wsj.com/washwire/2010/10/21/cyber-attack-strikes-freedomworks/,10/21/2010,Denial of Service,Insufficient Anti-automation,Downtime,Politics,"Washington, DC",No,,,,,,,,
-And now what about http://doc.php.net/phd/ar/phd/ ?",http://security-sh3ll.blogspot.com/2010/05/php-website-xss-defacement.html,5/2/2010,Cross Site Scripting (XSS),Improper Output Handling,Defacement,Technology,USA,No,,,,,,,,
-And now what about http://doc.php.net/phd/ar/phd/ ?",http://security-sh3ll.blogspot.com/2010/05/php-website-xss-defacement.html,5/2/2010,Cross Site Scripting (XSS),Improper Output Handling,Defacement,Technology,USA,No,,,,,,,,
-Another issue is defining a malware. Many times ads are used to entice users to download and install programs that are questionable. a rootkit installed through a known browser vulnerability is a malware, however the distinction between adware and malware is many time blurred and depends on:
-An SQL database system is used to store information, such as passwords. Using an ""SQL injection,"" he was able to log onto the site as an administrator. From there, he was able to upload files and to get the log-in information.
-An SQL injection vulnerability that could result in a hacker being able to access credit card numbers, expiration dates, and security codes of thousands of consumers was discovered in the web site of retailer ""life is good"".
-A number of theories abound, with favourites the state authorities??? websites have either been hacked or subject to a serious denial of service attack by hackers unhappy at the censorship.
-Anyone who tried to access the Cash Gordon website for more than an hour was sent elsewhere, such as to the Labour Party???s site or to hardcore pornography pages.",http://www.telegraph.co.uk/technology/twitter/7499228/Conservatives-embarrassed-as-hackers-exploit-loophole-on-anti-union-website.html,3/23/2010,Cross Site Scripting (XSS),Improper Output Handling,Defacement,Politics,United Kingdom,No,,,,,,,,
-Anyone who tried to access the Cash Gordon website for more than an hour was sent elsewhere, such as to the Labour Party???s site or to hardcore pornography pages.",http://www.telegraph.co.uk/technology/twitter/7499228/Conservatives-embarrassed-as-hackers-exploit-loophole-on-anti-union-website.html,3/23/2010,Cross Site Scripting (XSS),Improper Output Handling,Defacement,Politics,United Kingdom,No,,,,,,,,
-Apr-00,WHID 2000-4: Sensitive files left unprotected on Western Union's Web,Sensitive files were left in a publicly accessible directory during a maintenance window,http://news.com.com/2100-1023-245525.html?legacy=cnet,9/10/2000,Unintentional Information Disclosure,Insufficient Authorization,Leakage of Information,Finance,USA,No,,,,,,,,
-Apr-01,WHID 2001-4: Hacked Web site damaged PCs in Japan,"Users who visited the Price Lotto site using Microsoft's IE (Internet Explorer) 4.x and 5.x, automatically downloaded malicious JavaScript that was programmed to alter the software configuration of their PCs.",http://www.computerworld.com.au/article/52716/hacked_web_site_damaged_pcs_japan/,8/22/2001,Cross Site Scripting (XSS),Improper Output Handling,Planting of Malware,Retail,,No,,,,,,,,
-Apr-02,WHID 2002-4: Tower Records settles charges over hack attacks,"View other customers orders by changing a guessable number within a URL parameter
-Apr-03,WHID 2003-4: SQL injection on Guess site triggers an FTC inquiry,"
Additional information:
-Apr-04,WHID 2004-4: More Scary Tales Involving Big Holes In Web-Site Security - Kohl's,"Additional information:
-Apr-05,WHID 2005-4: An Israeli debate site vulnerable to XSS,"An Israeli public debates site called Hyde Park has an XSS vulnerability that exposes session cookies.
-Apr-06,WHID 2006-4: Hacker diverts traffic from city's Web page,"
A hoster was broken into by brute forcing passwords in a management interface. Sites of many clients, including three municipalities where defaced.
-Apr-07,WHID 2007-04: College glitch avails student information to public,"
A student at a community college in Sacramento who was "Googling" himself last month found his name, among 2000 others, in a file accidentally left by school staff online and picked by Google crawler.
-Apr-08,WHID 2008-04: RIAA web site cleared,"The web site of RIAA, the Recording Industry Association of America was attacked twice using SQL injection over the weekend. First a query that takes particularly long time was posted on a social network web site causing a distributed denial of service attack against the site. Later on hackers found and abused additional SQL injection and XSS vulnerabilities resulting in major defacement of the site.
-Apr-09,WHID 2009-4: Twitter Personal Info CSRF,"Gareth Heyes (and others) reported an interesting vulnerability in Twitter last week. While his post included a proof of concept code, it does not qualify as a hack only a vulnerability disclosure and the Web Hacking Incident Database does not list vulnerabilities.
-Apr-10,WHID 2010-4: Shopping website hacked with malware,"Australian retailer DealsDirect.com.au started serving malware to clients through a compromised partner advertising system. It seems that end users were made aware of malware due to Google Safe Browsing plugins in Google Chrome, Firefox and Internet Explorer browsers as they were alerted with the ""This site may harm your computer"" warning. It is a shame that web sites themselves aren't doing better at analyzing outbound data they are serving to ensure that it is not malicious.",http://news.ninemsn.com.au/technology/1029568/shopping-website-hacked-with-malware,3/19/2010,Content Spoofing,Improper Output Handling,Planting of Malware,Retail,Australia,No,,,,,,,,
-Apr-11,WHID 2011-4: Trapster Hacked,"A website that helps drivers avoid speeding tickets is warning its 10 million registered users that their email addresses and passwords may be in the hands of hackers who breached the site's security. The advisory was issued on Thursday by Trapster, which boasts more than 10 million users on its front page. The site uses crowd-sourcing techniques to compile locations of police who are using radar to catch speeding drivers. Trapster said the hack amounted to a ???single event,??? and that the company has since taken steps to ???prevent this type of attack from happening again, and continue to implement additional security measures to further protect your data.??? Trapster didn't say whether it planned to begin hashing passwords, which is considered a basic security precaution to prevent their disclosure.",http://www.theregister.co.uk/2011/01/21/trapster_website_hack/,1/20/2011,Unknown,Unknown,Leakage of Information,Web 2.0,,No,,,,,,,,
-Apr-12,WHID 2012-4: Hacker Group Anonymous Takes Down Over 40 Child Porn Sites,The group of computer hackers known as Anonymous has turned its attention from corporations long enough to attack and take down over 40 child porn websites run by pedophiles.,http://www.skyvalleychronicle.com/BREAKING-NEWS/HACKER-GROUP-ANONYMOUS-TAKES-DOWN-OVER-40-CHILD-PORN-SITES-874450,1/10/2012,Unknown,Unknown,Downtime,Hosting Provider,South Africa,Unknown,N/A,40+,Unknown,,,User names,1589,
-As a result, a number of blogs--including those that are a part of WordPress' VIP service--suffered connectivity issues. That includes the Financial Post, the National Post, TechCrunch, along with the service's nearly 18 million hosted blogs.",http://news.cnet.com/8301-1009_3-20038874-83.html,3/3/2011,Denial of Service,Insufficient Anti-automation,Downtime,Blogs,USA,No,,,,WordPress,,,,
-As a result, a number of blogs--including those that are a part of WordPress' VIP service--suffered connectivity issues. That includes the Financial Post, the National Post, TechCrunch, along with the service's nearly 18 million hosted blogs.",http://news.cnet.com/8301-1009_3-20038874-83.html,3/3/2011,Denial of Service,Insufficient Anti-automation,Downtime,Blogs,USA,No,,,,WordPress,,,,
-As a result, hackers can leverage the bug to upload executable scripts and gain complete control of the servers.",http://news.softpedia.com/news/Unpatched-OpenX-Vulnerability-Exploited-to-Compromise-Multiple-Ad-Servers-156402.shtml,9/15/2010,Known Vulnerability,Improper Input Handling,Planting of Malware,Entertainment,,No,,,,OpenX,,,,
-As a result, hackers can leverage the bug to upload executable scripts and gain complete control of the servers.",http://news.softpedia.com/news/Unpatched-OpenX-Vulnerability-Exploited-to-Compromise-Multiple-Ad-Servers-156402.shtml,9/15/2010,Known Vulnerability,Improper Input Handling,Planting of Malware,Entertainment,,No,,,,OpenX,,,,
-As expected in China, authorities were far from forgiving, and the student was jailed for 18 months.",,5/29/2008,Unknown,Insufficient Authorization,Disinformation,Government,China,No,,,China,,,,,
-As expected in China, authorities were far from forgiving, and the student was jailed for 18 months.",,5/29/2008,Unknown,Insufficient Authorization,Disinformation,Government,China,No,,,China,,,,,
-Ashley Mitchell, 29, of Little Park Road, Paignton, admitted accessing the system belonging to the Zynga Corporation and stealing 400 billion chips.
-""Ashton, you've been Punk'd. This account is not secure. Dude, where's my SSL?"" read the first message, which was posted around 17:30 Pacific Time on Wednesday. A few moments later, another message went out to Kutcher's 6.4 million Twitter followers:",https://threatpost.com/en_us/blogs/celebrity-ashton-kutcher-firesheepd-ted-conference-030311,3/3/2011,Stolen Credentials,Insufficient Transport Layer Protection,Session Hijacking,Web 2.0,USA,No,,,,Twitter,,,,
-""Ashton, you've been Punk'd. This account is not secure. Dude, where's my SSL?"" read the first message, which was posted around 17:30 Pacific Time on Wednesday. A few moments later, another message went out to Kutcher's 6.4 million Twitter followers:",https://threatpost.com/en_us/blogs/celebrity-ashton-kutcher-firesheepd-ted-conference-030311,3/3/2011,Stolen Credentials,Insufficient Transport Layer Protection,Session Hijacking,Web 2.0,USA,No,,,,Twitter,,,,
-As of Monday afternoon, local time, at least eight websites had been affected, including those for the president, prime minister, ministry of industry, ministry of foreign affairs, and the stock exchange.
-As with many websites, iTunes tells users to select a socalled 'security question' from a list of options when they first set up their account.
-At around 9 a.m. Eastern, instead of the normal list of the hottest new search terms of the hour, visitors to the Google Trends website were greeted with the phrase ""lol n------"".",http://www.politicsdaily.com/2010/06/17/google-trends-hacked-with-racial-slur-again/,6/17/2010,Process Automation,Insufficient Anti-automation,Disinformation,Search Engine,"San Jose, California",No,,,,Google,,,,
-At around 9 a.m. Eastern, instead of the normal list of the hottest new search terms of the hour, visitors to the Google Trends website were greeted with the phrase ""lol n------"".",http://www.politicsdaily.com/2010/06/17/google-trends-hacked-with-racial-slur-again/,6/17/2010,Process Automation,Insufficient Anti-automation,Disinformation,Search Engine,"San Jose, California",No,,,,Google,,,,
-Attack method
-Attacks on RIAA caused a dozens of interruptions in service, taking down the group's website for a total of one hour and 37 minutes, according to PandaLabs.",http://www.google.com/hostednews/afp/article/ALeqM5h7fm6cBhM33alDYD_1n4tTVHwXMw,9/20/2010,Denial of Service,Insufficient Anti-automation,Downtime,Entertainment,USA,Yes,Operation Payback,,,,,,,
-Attacks on RIAA caused a dozens of interruptions in service, taking down the group's website for a total of one hour and 37 minutes, according to PandaLabs.",http://www.google.com/hostednews/afp/article/ALeqM5h7fm6cBhM33alDYD_1n4tTVHwXMw,9/20/2010,Denial of Service,Insufficient Anti-automation,Downtime,Entertainment,USA,Yes,Operation Payback,,,,,,,
-At time of writing, much of the CSRF (cross-site request forgery) bug appeared to have been patched, Keith said. However, as noted earlier by IDG News, attackers still could exploit the flaw to control a user's ""like"" functions, which are used to endorse ads and other types of content.
-Aug-03,WHID 2003-8: SQL Injection in PetCo.com leads to FTC investigation,"Additional information:
-Aug-04,WHID 2004-8: Broadcast TV announcements changed by hacking the stations web site,"Previously moderated weather announcements could be changed by the user
-Aug-05,WHID 2005-8: eBay Redirect Becomes Phishing Tool,"
Additional information:
-Aug-06,WHID 2006-8: ICQmail.com - Mail2World.com XSS vulnerability,"Links sent to a user as part of the mail content are not properly sanitized, so a user receiving such mail and activating a link would be affected.
-Aug-07,WHID 2007-08: WordPress Backdoor,"
Backdoor was planted in a new official release of WordPress, the most popular blogging software in the world. It was available for download for a few days before the backdoor was located.
-Aug-08,WHID 2008-08: Hacker steals Davidson Cos. clients' data,"
A computer hacker broke into the database of D.A. Davidson, a local Montana financial services firm and stole their entire customers' database: 226,000 records including names and social security numbers. Attack_Method is not known, but it seems very much like a web hack.
-Aug-09,WHID 2009-8: Wired.com Image Viewer Hacked to Create Phony Steve Jobs Health Story,"John Abell from Wired magazine often writes about Apple's CEO health. However, this report about Job suffering a cardiac arrest, was neither his nor true. The culprit was Wired public image viewing utility which lets people upload am image and than presented the image as part of the Wired web site, banner and domain included.
-Aug-10,WHID 2010-8: Cross-site scripting vulnerabilities see two political websites hacked,A report on BBC News said that visitors to Spain's EU presidency website were greeted by an image of comedy character Mr Bean instead of the Spanish Prime Minister Jose Luis Rodriguez Zapatero. The government said that the site - www.eu2010.es - had not been attacked and that a hacker had taken a screenshot of the homepage to make a photo montage using a cross-site scripting (XSS) vulnerability. Visitors found an image of Mr Bean complete with a benign smile and the words ???Hi there'.,http://www.scmagazineuk.com/cross-site-scripting-vulnerabilities-see-two-political-websites-hacked/article/160597/,1/5/2010,Cross Site Scripting (XSS),Improper Output Handling,Defacement,Government,Spain,No,,,,,,,,
-Aug-11,WHID 2011-8: Casino Gambler Databases Becoming A Key Tool For Hackers,"Players club points can be a valuable commodity when it comes to casinos, and hackers are now taking aim at player accounts. Several cases have been reported in Las Vegas of hackers getting into players club accounts and stealing the accumulated points.
-Aug-12,"WHID 2012-8: Zappos website hacked; credit card database not affected, CEO says","Zappos.com, the popular online shoe site, was the victim of a cyber attack by a hacker who gained access to part of the company's internal network through one of its servers, Chief Executive Tony Hsieh said in an email to employees Sunday.",http://latimesblogs.latimes.com/technology/2012/01/zappos-hacked.html,1/15/2012,Unknown,Unknown,Leakage of Information,Retail,"Henderson, NV",No,NA,1,Unknown,Unknown,Unknown,User accounts,Unknown,
-Austism Spectrum Australia (ASPECT), the country's autism service provider, is losing hundreds of dollars in online donations each day after its website was hit by hackers early on Sunday.",http://www.stuff.co.nz/technology/3486923/Hackers-crash-Aussie-charity-websites,3/22/2010,Denial of Service,Insufficient Anti-automation,Downtime,Health,Australia,No,,,USA,,,,,
-Austism Spectrum Australia (ASPECT), the country's autism service provider, is losing hundreds of dollars in online donations each day after its website was hit by hackers early on Sunday.",http://www.stuff.co.nz/technology/3486923/Hackers-crash-Aussie-charity-websites,3/22/2010,Denial of Service,Insufficient Anti-automation,Downtime,Health,Australia,No,,,USA,,,,,
-Authorities eventually discovered that the hacker who used a proxy server in Russia to mask his identity owned a driving school in Philadelphia, and exploited a vulnerability in the driving test scheduling system to allow the scheduling of more tests than the allotted time slots. It could take upward of six weeks to schedule a driving test in Philadelphia. Said Maley:
-Barclays thought it was prepared for this sort of reconnaissance, said Romain. The bank's security team had reviewed the software behind its website payment system and got everything ship-shape.
-Barracuda representatives didn't respond to emails seeking confirmation of the post, which claims the data was exposed as the result of a SQL injection attack.",http://www.theregister.co.uk/2011/04/11/barracuda_networks_attack/,4/11/2011,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,No,,,,,,,,
-Barracuda representatives didn't respond to emails seeking confirmation of the post, which claims the data was exposed as the result of a SQL injection attack.",http://www.theregister.co.uk/2011/04/11/barracuda_networks_attack/,4/11/2011,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,No,,,,,,,,
-bdnews24.com, at around 2.30am, found that 19 out of 64 district web portals had been hacked by ""MIL INDIAN HACKER"", threatening ""cyber war"" in retaliation to any terrorist attack by Pakistan on Indian soil ""via Bangladesh"".
-Ben Ali's administration has tightly restricted the flow of information out of Tunisia since widespread protests began on December 17, following 26-year-old Mohamed Bouazizi's suicide attempt. But reports of civil disobedience and police action filtered out on Twitter on Monday, with some users reporting the use of tear gas by security forces.
-Besides, on June 29, hackers attacked Azdagir.am site of announcements again to place the Azerbaijani flag on it, as well as information on the January 20, 1990, events in Baku. On June 30, the owner of psyarmenia.com website told PanARMENIAN.Net that the site on psychology was hacked and a poster on ""Armenian terror"" was placed on it. Currently, the two websites do not operate.",http://www.panarmenian.net/eng/it_telecom/news/50897/At_least_four_Armenian_websites_were_attacked_by_Azerbaijani_hackers,7/3/2010,Unknown,Improper Output Handling,Defacement,Government,Armenia,No,,,,,,,,
-Besides, on June 29, hackers attacked Azdagir.am site of announcements again to place the Azerbaijani flag on it, as well as information on the January 20, 1990, events in Baku. On June 30, the owner of psyarmenia.com website told PanARMENIAN.Net that the site on psychology was hacked and a poster on ""Armenian terror"" was placed on it. Currently, the two websites do not operate.",http://www.panarmenian.net/eng/it_telecom/news/50897/At_least_four_Armenian_websites_were_attacked_by_Azerbaijani_hackers,7/3/2010,Unknown,Improper Output Handling,Defacement,Government,Armenia,No,,,,,,,,
-Between November 21st and December 15th, 2010, Lee, 32, head of the computer server company along with Park, 37, a hacker working for an Incheon based crime gang which owned the gambling site, organised distributed denial-of-service attacks (DDoS",http://www.onlinepoker.net/poker-news/general-poker-news/cyber-criminals-attack-online-casino-sites/9141,1/13/2011,Denial of Service,Insufficient Anti-automation,Monetary Loss,Entertainment,South Korea,No,,,South Korea,,,,,
-Between November 21st and December 15th, 2010, Lee, 32, head of the computer server company along with Park, 37, a hacker working for an Incheon based crime gang which owned the gambling site, organised distributed denial-of-service attacks (DDoS",http://www.onlinepoker.net/poker-news/general-poker-news/cyber-criminals-attack-online-casino-sites/9141,1/13/2011,Denial of Service,Insufficient Anti-automation,Monetary Loss,Entertainment,South Korea,No,,,South Korea,,,,,
-""Bulletproof received monitoring alerts of packet loss at 12:45 am. We identified it as a classic denial-of-service attack being targeted at Whirlpool. We immediately blocked Whirlpool IP addresses to observe it better and then we were able to track down that it was originating from Denmark and the United States,"" Lorenzo Modesto, chief operating officer at Bulletproof Networks, the company hosting Whirlpool, commented for ZDNet Australia.",http://news.softpedia.com/news/Whirlpool-Repeatedly-Hit-by-DDoS-Attacks-145629.shtml,6/29/2010,Denial of Service,Insufficient Anti-automation,Downtime,Media,Australia,No,,,Denmark,,,,,
-""Bulletproof received monitoring alerts of packet loss at 12:45 am. We identified it as a classic denial-of-service attack being targeted at Whirlpool. We immediately blocked Whirlpool IP addresses to observe it better and then we were able to track down that it was originating from Denmark and the United States,"" Lorenzo Modesto, chief operating officer at Bulletproof Networks, the company hosting Whirlpool, commented for ZDNet Australia.",http://news.softpedia.com/news/Whirlpool-Repeatedly-Hit-by-DDoS-Attacks-145629.shtml,6/29/2010,Denial of Service,Insufficient Anti-automation,Downtime,Media,Australia,No,,,Denmark,,,,,
-But apparently since March, when the details of the insecurity were published on seclists.org, nobody did anything to patch the vulnerability so porkythepig decided to prove his observations the hard way. Polish language source is here - but the vulnerability still works at time of publishing so try it yourself.",http://www.techeye.net/security/polish-hacker-gets-inside-us-militarys-defence-logistic-agency-website,9/16/2010,SQL Injection,Improper Input Handling,Defacement,Government,USA,No,,,Poland,,,,,http://seclists.org/fulldisclosure/2010/Mar/521
-But apparently since March, when the details of the insecurity were published on seclists.org, nobody did anything to patch the vulnerability so porkythepig decided to prove his observations the hard way. Polish language source is here - but the vulnerability still works at time of publishing so try it yourself.",http://www.techeye.net/security/polish-hacker-gets-inside-us-militarys-defence-logistic-agency-website,9/16/2010,SQL Injection,Improper Input Handling,Defacement,Government,USA,No,,,Poland,,,,,http://seclists.org/fulldisclosure/2010/Mar/521
-But computer security experts say hackers are easily hijacking accounts by pretending they are a customer who has forgotten their password.
-But on clicking it, the victim was diverted to a YouTube video appeared on his Facebook account. Consequently, the victim and his contacts were infected. Krzysztof Kotowicz, a freelance security researcher, states that presently the attack is effective merely in Chrome and Firefox Web-browsers, as reported by Help Net Security on December 22, 2009.",http://www.spamfighter.com/News-13684-Clickjacking-Attack-Hit-Facebook.htm,12/23/2009,Clickjacking,Insufficient Process Validation,Worm,Web 2.0,USA,No,,,,,,,,
-But on clicking it, the victim was diverted to a YouTube video appeared on his Facebook account. Consequently, the victim and his contacts were infected. Krzysztof Kotowicz, a freelance security researcher, states that presently the attack is effective merely in Chrome and Firefox Web-browsers, as reported by Help Net Security on December 22, 2009.",http://www.spamfighter.com/News-13684-Clickjacking-Attack-Hit-Facebook.htm,12/23/2009,Clickjacking,Insufficient Process Validation,Worm,Web 2.0,USA,No,,,,,,,,
-But school was not closed. Someone logged on to FOX23.com and posted the closing without anyone's permission.",http://www.fox23.com/news/local/story/Hacker-Hits-FOX23-School-Closings/nJlTwic8fEqLIhxpEs2Vow.cspx,1/11/2011,Unknown,Unknown,Disinformation,Media,"Oklahoma, USA",No,,,,,,,,
-But school was not closed. Someone logged on to FOX23.com and posted the closing without anyone's permission.",http://www.fox23.com/news/local/story/Hacker-Hits-FOX23-School-Closings/nJlTwic8fEqLIhxpEs2Vow.cspx,1/11/2011,Unknown,Unknown,Disinformation,Media,"Oklahoma, USA",No,,,,,,,,
-But the reclusive singer issued a statement on New Year's Eve saying he is happily married to former model Michelle Rocca.
-But this was only a small prelude to the real thing. CNet reports that this time hackers took over an entire TLD (Top Level Domain, or country) DNS server using SQL injection, virtually defacing the Puerto Rican site of companies such as Google and Microsoft.
-By writing Twitter messages containing the ???#cashgordon??? and their own piece of web code, they were able to redirect visitors to any other site on the internet.
-Calling it the ""most exclusive e-mail list on the planet,"" Gawker said the list of exposed owners included New York Mayor Michael Bloomberg, White House Chief of Staff Rahm Emanuel and other powerful figures in finance, media and politics.
-Cipro has been under fire for several months following claims criminals were able to hack into its database.",http://www.eyewitnessnews.co.za/articleprog.aspx?id=48673,9/17/2010,SQL Injection,Improper Input Handling,Disinformation,Government,South Africa,No,,,,,,,,
-Cipro has been under fire for several months following claims criminals were able to hack into its database.",http://www.eyewitnessnews.co.za/articleprog.aspx?id=48673,9/17/2010,SQL Injection,Improper Input Handling,Disinformation,Government,South Africa,No,,,,,,,,
-Clicking on the link sends a request to CNN which instructs the browser to send a second request to the redirect URL ??? in this case the shortened http:/bit.ly/cP???XW. The host site would not be aware of the misuse ??? the spammer is simply abusing legitimate ad-serving functionality.
-Click laundering, meanwhile, is a more advanced form of click fraud designed to outwit fraud detection systems by hiding the origin of fake clicks.",http://www.scmagazineus.com/microsoft-files-two-lawsuits-for-click-laundering/article/170621/,5/20/2010,Cross Site Request Forgery (CSRF),Abuse of Functionality,Fraud,Technology,USA,No,,,,,,,,
-Click laundering, meanwhile, is a more advanced form of click fraud designed to outwit fraud detection systems by hiding the origin of fake clicks.",http://www.scmagazineus.com/microsoft-files-two-lawsuits-for-click-laundering/article/170621/,5/20/2010,Cross Site Request Forgery (CSRF),Abuse of Functionality,Fraud,Technology,USA,No,,,,,,,,
-Compromising someone's Facebook account also provides immediate access to a pool of new potential victims: the friends of the person whose account has been hacked.",http://www.informationweek.com/news/software/showArticle.jhtml?articleID=224701441,5/10/2010,Unknown,Insufficient Authentication,Phishing,Web 2.0,USA,No,,,,Facebook,,,,
-Compromising someone's Facebook account also provides immediate access to a pool of new potential victims: the friends of the person whose account has been hacked.",http://www.informationweek.com/news/software/showArticle.jhtml?articleID=224701441,5/10/2010,Unknown,Insufficient Authentication,Phishing,Web 2.0,USA,No,,,,Facebook,,,,
-Computer security researchers have said that an unprecedented mass cyber protest was triggered by efforts by film and music trade groups to close online piracy haunts.
-contacted the Fedora Infrastructure Team indicating that he had received
-Correll even points out exactly where the exploited SQL injection weakness was located and calls the flaw ""rudimentary.""",http://news.softpedia.com/news/SQL-Injection-Used-to-Deface-Copyprotected-Others-Might-Follow-161316.shtml,10/16/2010,SQL Injection,Improper Input Handling,Defacement,Entertainment,USA,Yes,Operation Payback,,,,,,,
-Correll even points out exactly where the exploited SQL injection weakness was located and calls the flaw ""rudimentary.""",http://news.softpedia.com/news/SQL-Injection-Used-to-Deface-Copyprotected-Others-Might-Follow-161316.shtml,10/16/2010,SQL Injection,Improper Input Handling,Defacement,Entertainment,USA,Yes,Operation Payback,,,,,,,
-Customers who have forgotten their passwords are prompted with the question they first selected when they set up their profile - as long as they give the correct answer, they can access the account.
-Cyber criminals are able to crack the accounts by using brute force attacks, where an automated system tries thousands of popular passwords with each account name.",http://www.computing.co.uk/ctg/news/2039945/hackers-attack-itunes,4/4/2011,Brute Force,Insufficient Anti-automation,Fraud,Retail,,No,,,,,,,,
-Cyber criminals are able to crack the accounts by using brute force attacks, where an automated system tries thousands of popular passwords with each account name.",http://www.computing.co.uk/ctg/news/2039945/hackers-attack-itunes,4/4/2011,Brute Force,Insufficient Anti-automation,Fraud,Retail,,No,,,,,,,,
-DDoS attacks are efforts to overload websites with so many simultaneous requests that computer servers can't handle the load and freeze or crash.
-Dec-04,WHID 2004-12: XSS in Gmail,"An XSS was found in G-Mail
-Dec-05,WHID 2005-12: Insufficient authentication on Arbela mutual insurance allowed access to private data,"
Extranet system accessible to the public
-Dec-06,WHID 2006-12: Music Web Site: Breach Exposed Accounts,"
A musical instrument and sound gear Web site that advertises its relationship with artists such as Dave Matthews, Carlos Santana and Mary J. Blige was breached and notified some customers that their credit card information may have been stolen.
-Dec-07,WHID 2007-12: SQL injection at knorr.de login page,"
While vulnerabilities in public web sites are dime a dozen this days and rarely included in WHID, a classic SQL injection in the login form on the home page of the web site of a very big company is worth an entry. In my presentation I usually claim that such vulnerabilities have disappeared years ago and then go on to show advanced SQL injection techniques. It seems that they exit.
-Dec-08,WHID 2008-12: Greek ministry websites hit by hacker intrusion,"
This is yet another case of defacement of a governmental web site. It is amazing to note it is nearly never the large commercial and financial web sites that are defaced. It is either small mom and dad shops or government and political web sites. Don't you get the feeling the government IT is run like a mom and dad shop? Do you wonder if it is only the IT part that is run that way?
-Dec-09,WHID 2009-12: Embassy of India in Spain found serving remote malware through iFrame attack,"
Ismael Valenzuela sent us a story about yet another malware through iFrame serving site. This time it is an official one, belonging to the Indian government official branch in Spain - it's embassy.
-Dec-10,WHID 2010-12: Army Website Compromised Through SQL Injection,"A Romanian grey hat hacker has disclosed an SQL inject (SQLi) vulnerability on a website belonging to the United States Army, which leads to full database compromise. The website, called Army Housing OneStop, is used to provide information about military housing facilities to soldiers.",http://news.softpedia.com/news/Army-Website-Compromised-Through-SQL-Injection-131649.shtml,1/9/2010,SQL Injection,Improper Input Handling,Leakage of Information,Government,USA,No,,,Romania,,,,,
-Dec-11,WHID 2011-12: Cyber Criminals Attack A Hundred Online Casino Sites,"A South Korean web hosting company that allegedly hosted an illegal gambling site is in trouble with authorities for organising a series of ???cyber attacks??? on competing illegal online casinos in order to grab gambling business from rival gangsters.
-Dec-12,WHID 2012-12: Anonymous takedown FBI as Megaupload Shutdown retaliation,"After FBI Federal agents executed a shutdown on the files sharing website Megaupload on Thursday, the response of Internet comes rapidly from none other than Anonymous.",http://www.nationalturk.com/en/anonymous-takedown-fbi-as-megaupload-shutdown-retaliation-16006,1/20/2012,Denial of Service,Insufficient Anti-automation,Downtime,Government,United States,Yes,Distributed Denial of Service,6+,United States,Unknown,Unknown,None,NA,
-""Defendants developed and executed an elaborate scheme to circumvent Microsoft's Hotmail spam filters to disseminate a large quantity of spam email advertisements to Microsoft's Hotmail users,"" the company alleges in its complaint, filed last week in federal district court in Seattle.
-Despite the hosting company???s apparent desperation Saturday, ZimEye was able to trace the notorious hackers to a location in the Indonesian town of Bandug. The hackers specialise in hacking websites made by the Joomlah software on which the Zimdiaspora is built. They have also declared it openly that this is their field of speciality.",http://www.zimeye.org/?p=16521,4/24/2010,Unknown,Unknown,Downtime,Media,Zimbabwe,No,,,Indonesia,Joomla,,,,
-Despite the hosting company???s apparent desperation Saturday, ZimEye was able to trace the notorious hackers to a location in the Indonesian town of Bandug. The hackers specialise in hacking websites made by the Joomlah software on which the Zimdiaspora is built. They have also declared it openly that this is their field of speciality.",http://www.zimeye.org/?p=16521,4/24/2010,Unknown,Unknown,Downtime,Media,Zimbabwe,No,,,Indonesia,Joomla,,,,
-Details of the flaw were posted on several message boards and rapid and widespread defacement occured, ranging from political satire to hate speak.",http://forums.theregister.co.uk/forum/1/2010/10/16/conservative_party_website_hacked/,10/16/2010,SQL Injection,Improper Input Handling,Defacement,Politics,United Kingdom,No,,20,Multiple sources,,,,,
-Details of the flaw were posted on several message boards and rapid and widespread defacement occured, ranging from political satire to hate speak.",http://forums.theregister.co.uk/forum/1/2010/10/16/conservative_party_website_hacked/,10/16/2010,SQL Injection,Improper Input Handling,Defacement,Politics,United Kingdom,No,,20,Multiple sources,,,,,
-Don Mayer, CEO of Small Dog Electronics, explained that the company is PCI compliant, and that it had been subjected to a penetration test by a third party, which he would not name. The flaw in the code has now been rectified, and Small Dog is investigating the issue with the pen tester, added Mayer, who did not know what language the ecommerce system had been written in.",http://www.infosecurity-us.com/view/7411/3000-small-dog-electronics-customers-credit-card-details-compromised/,2/18/2010,SQL Injection,Improper Input Handling,Credit Card Leakage,Retail,USA,No,,,,,,,3000,
-Don Mayer, CEO of Small Dog Electronics, explained that the company is PCI compliant, and that it had been subjected to a penetration test by a third party, which he would not name. The flaw in the code has now been rectified, and Small Dog is investigating the issue with the pen tester, added Mayer, who did not know what language the ecommerce system had been written in.",http://www.infosecurity-us.com/view/7411/3000-small-dog-electronics-customers-credit-card-details-compromised/,2/18/2010,SQL Injection,Improper Input Handling,Credit Card Leakage,Retail,USA,No,,,,,,,3000,
-""Earlier this week, we discovered a bug that made it possible for an application to bypass our normal CSRF (cross-site request forgery) protections through a complicated series of steps. We quickly worked to resolve the issue and fixed it within hours of discovering it,"" Facebook said in a statement. ""For a short period of time before it was fixed, several applications that violated our policies were able to post content to people's profiles if those people first clicked on a link to the application.""",http://news.cnet.com/8301-27080_3-20015728-245.html,9/7/2010,Cross Site Request Forgery (CSRF),Improper Output Handling,Disinformation,Web 2.0,USA,No,,,,Facebook,,,,
-""Earlier this week, we discovered a bug that made it possible for an application to bypass our normal CSRF (cross-site request forgery) protections through a complicated series of steps. We quickly worked to resolve the issue and fixed it within hours of discovering it,"" Facebook said in a statement. ""For a short period of time before it was fixed, several applications that violated our policies were able to post content to people's profiles if those people first clicked on a link to the application.""",http://news.cnet.com/8301-27080_3-20015728-245.html,9/7/2010,Cross Site Request Forgery (CSRF),Improper Output Handling,Disinformation,Web 2.0,USA,No,,,,Facebook,,,,
-Editor's notes: (1) As a policy, we decided to report each such conflict as a single incident, unless some hack is especiallly of interest. The author of this incident is Israeli.","http://www.ynetnews.com/articles/0,7340,L-3649281,00.html",1/5/2009,Various,Insufficient Authentication,Downtime,Multiple,,No,,,,,,,,
-Editor's notes: (1) As a policy, we decided to report each such conflict as a single incident, unless some hack is especiallly of interest. The author of this incident is Israeli.","http://www.ynetnews.com/articles/0,7340,L-3649281,00.html",1/5/2009,Various,Insufficient Authentication,Downtime,Multiple,,No,,,,,,,,
-""Emails can appear to originate from your bank, or other legitimate location, and when opened can cause great financial damage,"" the department wrote. ""Use extra care with your email and where you may send/enter any personal information.""",http://www.pressofatlanticcity.com/news/top_three/article_35e425d8-32f2-11df-a24f-001cc4c03286.html,3/19/2010,Stolen Credentials,Insufficient Authentication,Monetary Loss,Finance,"New Jersey, USA",No,,,,,,,,http://www.krebsonsecurity.com/2010/03/organized-crooks-hit-nj-town-arizona-utility/
-""Emails can appear to originate from your bank, or other legitimate location, and when opened can cause great financial damage,"" the department wrote. ""Use extra care with your email and where you may send/enter any personal information.""",http://www.pressofatlanticcity.com/news/top_three/article_35e425d8-32f2-11df-a24f-001cc4c03286.html,3/19/2010,Stolen Credentials,Insufficient Authentication,Monetary Loss,Finance,"New Jersey, USA",No,,,,,,,,http://www.krebsonsecurity.com/2010/03/organized-crooks-hit-nj-town-arizona-utility/
- Ensuring proper validation of all inputs in Web applications, in order to prevent cross-site scripting and SQL injection vulnerabilities, is actually a requirement of the Payment Card Industry Data Security Standard (PCI-DSS).",http://news.softpedia.com/news/XSS-Flaw-Found-on-Secure-American-Express-Site-159439.shtml,10/5/2010,Cross Site Scripting (XSS),Improper Output Handling,Phishing,Credit Card Issuer,USA,No,,,,,,,,
- Ensuring proper validation of all inputs in Web applications, in order to prevent cross-site scripting and SQL injection vulnerabilities, is actually a requirement of the Payment Card Industry Data Security Standard (PCI-DSS).",http://news.softpedia.com/news/XSS-Flaw-Found-on-Secure-American-Express-Site-159439.shtml,10/5/2010,Cross Site Scripting (XSS),Improper Output Handling,Phishing,Credit Card Issuer,USA,No,,,,,,,,
-Eric Brown, a spokesman for the mayor's office, said he didn't know what time the site was breached and when it might be restored.",http://www.denverpost.com/news/ci_15155519,5/25/2010,Unknown,Improper Output Handling,Defacement,Government,USA,No,,,,,,,,
-Eric Brown, a spokesman for the mayor's office, said he didn't know what time the site was breached and when it might be restored.",http://www.denverpost.com/news/ci_15155519,5/25/2010,Unknown,Improper Output Handling,Defacement,Government,USA,No,,,,,,,,
-Every day these slots were visible to the users only for a few minutes till the slots released by the passport authorities were exhausted.
-Facebook did not respond to Technolog???s request for comment. But according to French security site Zazak, the bug that opened the door for Roy yesterday was reported, and slammed shut today.
-Facebook's appeal to cybercriminals arises from the high level of trust that users extend to Facebook messages, which are generally presumed to come from friends.
-Feb-00,WHID 2000-2: IKEA exposes customer information on catalog site,"Error message revealed a database file location, which could be downloaded.",http://news.com.com/2100-1017-245372.html?legacy=cnet,9/6/2000,Unintentional Information Disclosure,Insufficient Authentication,Leakage of Information,Retail,,No,,,,,,,,
-Feb-01,WHID 2001-2: Computer E-Retailer Exposes Credit Card Numbers,View other orders by changing a sequential parameter number. Security was provided by client side JavaScript,"http://www.extremetech.com/article2/0,3973,103782,00.asp",6/18/2001,Predictable Resource Location,Insufficient Authorization,Disclosure Only,Retail,,No,,,,,,,,
-Feb-02,WHID 2002-2: Advogato XSS virus account,"Additional information:
-Feb-03,WHID 2003-2: UT Austin hack yields personal info on thousands,"While an old incident, further research into it suggest that it was a web hack. While the initial reports talk about a database break in, a report in the Register identify the database as txClass, which is a web based system.
55,200 social security numbers where stolen, though the hacker claimed that he did not perform the act for profit. He was caught and sentenced to 5 years probation.
-Feb-04,"WHID 2004-2: Biggest Web Problem Isn't About Privacy, It's Sloppy Security - Saks","
Additional information:
-Feb-05,WHID 2005-2: Froogle XSS,"An XSS was found in Froogle
-Feb-06,WHID 2006-2: GSA takes down eOffer after finding security flaw,"
Documents uploaded to GSA site where accessed using a predictable sequential identifier without requiring special permissions. The documents where available both for viewing and modifying. The site was in service for more than 18 months until the vulnerability was discovered.
-Feb-08,WHID 2008-02: Italian Bank's XSS Opportunity Seized by Fraudsters,"
It has been a while since a phishing scam using XSS vulnerability found its way to the Web Hacking Incidents database (SunTrust, WHID 2004-11). The current incident is a good example of what does and does not get into our database: XSS vulnerabilities in public web sites are discovered daily and reported in sites such as XSSed, however most of these vulnerabilities are not included in WHID for lack of public interest. The current incident is different since the vulnerability is known to be exploited by attackers, moving it from the realm of technical interest to the realm of a real problem.
-Feb-09,WHID 2009-2: Twitter accounts of the famous hacked (Updated),"Update (Jan 11th 2009) - The hacker bragged about the hack and revealed that it was a brute force dictionary attack against an administrator account. Twitter does not block repetitive login failures therefore enabling brute force attacks. We are still leaving the incident classification ""insufficient authentication"" in addition to brute force as we feel an administration interface should have additional authentication mechanism and not just a password.
-Feb-10,WHID 2010-2: Hacker Disables More Than 100 Cars Remotely,"Hundreds of cars would not start and/or had their horn honking when a former employee at Texas Auto Center used previous passwords to log into a system called Webtech Plus whic is used as an alternative to repossessing vehicles that haven???t been paid for. Operated by Cleveland-based Pay Technologies, the system lets car dealers install a small black box under vehicle dashboards that responds to commands issued through a central website, and relayed over a wireless pager network. The dealer can disable a car???s ignition system, or trigger the horn to begin honking, as a reminder that a payment is due. The hacker destroyed account records and then started to disable cars/force the horn to honk continuously.
-Feb-11,WHID 2011-2: Attacks on Lush website expose credit-card details,"Cosmetics company Lush has warned customers that its UK website has been hacked repeatedly over the past three months, exposing credit-card details to fraudulent use. The website of cosmetics retailer Lush has been hacked repeatedly over the last three months. Lush did not release technical details of the attack, nor specify the number of customers compromised or the security techniques used to handle the data involved, but anecdotal evidence indicates that some customers have been the victims of fraud. The company sent an email statement to customers on Thursday outlining the incident and urging them to contact their banks.",http://www.zdnet.co.uk/news/security/2011/01/21/attacks-on-lush-website-expose-credit-card-details-40091520/,1/20/2011,SQL Injection,Improper Input Handling,Credit Card Leakage,Retail,United Kingdom,No,,,,,,,,
-Feb-12,WHID-2012-2: Hackers disable German right-wing websites,The websites of several right-wing extremists in Germany have been attacked by hackers.,http://www.jta.org/news/article/2012/01/05/3091030/hackers-disable-german-right-wing-websites,1/1/2012,Denial of Service,Insufficient Anti-automation,Downtime,Politics,Germany,Unknown,Denial of Service,Multiple unknown,Unknown,,,,,
-Followers to the genuine account were told: ""Terry is now in charge of operation Top Kill, work will recommence after we find a XXL wetsuit. #bpcares #oilspill.""",http://www.foxnews.com/scitech/2010/05/27/hackers-bp-twitter-feed/,5/27/2010,Unknown,Unknown,Disinformation,Web 2.0,USA,No,,,,Twitter,,,,
-Followers to the genuine account were told: ""Terry is now in charge of operation Top Kill, work will recommence after we find a XXL wetsuit. #bpcares #oilspill.""",http://www.foxnews.com/scitech/2010/05/27/hackers-bp-twitter-feed/,5/27/2010,Unknown,Unknown,Disinformation,Web 2.0,USA,No,,,,Twitter,,,,
-For its part, Skyrock believes that ???at this stage, we cannot determine whether the application Waka was concerned.???
-FreedomWorks officials are investigating, but they suspect they were attacked deliberately, perhaps by a political opponent seeking the thwart its fund-raising efforts.
-From a defensive perspective, the online brokerage accounts should be doing more to authenticate users and validate transactions. The challenging part is that these types of defensive mechanisms may actually interfere with many of the automated bot programs that investors use to monitor and execute trades. Online trading fraud is not going to go away anytime soon.
-function show_alert()
-Hackers extracted usernames and password hashes from the site, which were subsequently posted to pastebin.com.",http://www.theregister.co.uk/2011/03/28/mysql_hack/,3/28/2011,SQL Injection,Improper Input Handling,Leakage of Information,Technology,USA,No,,,Romainia,,,"usernames, passwords",,
-Hackers extracted usernames and password hashes from the site, which were subsequently posted to pastebin.com.",http://www.theregister.co.uk/2011/03/28/mysql_hack/,3/28/2011,SQL Injection,Improper Input Handling,Leakage of Information,Technology,USA,No,,,Romainia,,,"usernames, passwords",,
-Hackers for several days have attacked the websites of opponents of Iran's regime and posted the same image. The opponents have used social-media sites like Twitter to organize street protests this year.",http://www.csmonitor.com/Money/2009/1218/Iranian-hacker-attack-What-will-it-cost-Twitter,12/17/2009,DNS Hijacking,Application Misconfiguration,Defacement,Web 2.0,,No,,,Iran,,,,,
-Hackers for several days have attacked the websites of opponents of Iran's regime and posted the same image. The opponents have used social-media sites like Twitter to organize street protests this year.",http://www.csmonitor.com/Money/2009/1218/Iranian-hacker-attack-What-will-it-cost-Twitter,12/17/2009,DNS Hijacking,Application Misconfiguration,Defacement,Web 2.0,,No,,,Iran,,,,,
-Hackers set the drive-by malware up at the BBC's 6 Music website and the BBC 1Xtra radio station website. Researchers at the insecurity outfit Websense found the exploits and put its report up on its security labs blog.
-Hackers simply pretend they are a customer who has forgotten their password and can easily work out the answer to the personal question using information that users have posted on social-networking websites such as Facebook and Twitter.",http://www.dailymail.co.uk/news/article-1280354/Got-iTunes-account-Thats-music-cyber-fraudsters-ears.html,5/22/2010,Brute Force,Insufficient Password Recovery,Session Hijacking,Web 2.0,USA,No,,,,,,,,
-Hackers simply pretend they are a customer who has forgotten their password and can easily work out the answer to the personal question using information that users have posted on social-networking websites such as Facebook and Twitter.",http://www.dailymail.co.uk/news/article-1280354/Got-iTunes-account-Thats-music-cyber-fraudsters-ears.html,5/22/2010,Brute Force,Insufficient Password Recovery,Session Hijacking,Web 2.0,USA,No,,,,,,,,
-He claimed that ""it took only a short while to retrieve a user's login information"" before apologising for the matter and vanishing.",http://www.channelnewsasia.com/stories/entertainment/view/1087981/1/.html,10/19/2010,Abuse of Functionality,Insufficient Password Recovery,Disinformation,Entertainment,Hong Kong,No,,,,,,,,
-He claimed that ""it took only a short while to retrieve a user's login information"" before apologising for the matter and vanishing.",http://www.channelnewsasia.com/stories/entertainment/view/1087981/1/.html,10/19/2010,Abuse of Functionality,Insufficient Password Recovery,Disinformation,Entertainment,Hong Kong,No,,,,,,,,
-Here???s how Baidu alleges the hacker got access to one of the world???s most popular web sites domain name account in under an hour:
-He said that if the website is vulnerable , it means that the hacker can get access to the control panel of the site, look into the contents such as tendering details, property tax details , building plans and allocation of funds, access to which is restricted to only senior-level civic officials.",http://timesofindia.indiatimes.com/articleshow/5979202.cms,5/27/2010,SQL Injection,Improper Input Handling,Leakage of Information,Government,India,No,,,,,,,,
-He said that if the website is vulnerable , it means that the hacker can get access to the control panel of the site, look into the contents such as tendering details, property tax details , building plans and allocation of funds, access to which is restricted to only senior-level civic officials.",http://timesofindia.indiatimes.com/articleshow/5979202.cms,5/27/2010,SQL Injection,Improper Input Handling,Leakage of Information,Government,India,No,,,,,,,,
-He then sold some of the virtual chips on the black market for ??53,000.",http://www.thisissouthdevon.co.uk/news/HACKER-ADMITS-STEALING-12m-POKER-CHIPS/article-3170994-detail/article.html,2/2/2011,Unknown,Unknown,Loss of Sales,Entertainment,"San Francisco, CA",No,,,"Paignton, UK",,,,,
-He then sold some of the virtual chips on the black market for ??53,000.",http://www.thisissouthdevon.co.uk/news/HACKER-ADMITS-STEALING-12m-POKER-CHIPS/article-3170994-detail/article.html,2/2/2011,Unknown,Unknown,Loss of Sales,Entertainment,"San Francisco, CA",No,,,"Paignton, UK",,,,,
-How do I know? We run multiple honeypots to detect web-based attacks and malware. And guess who started attacking us?",http://blog.sucuri.net/2010/02/georgia-government-sites-hacked-and-spreading-malware.html,2/15/2010,Remote File Inclusion (RFI),Application Misconfiguration,Planting of Malware,Government,"imereti, GE",No,,,,,,,,
-How do I know? We run multiple honeypots to detect web-based attacks and malware. And guess who started attacking us?",http://blog.sucuri.net/2010/02/georgia-government-sites-hacked-and-spreading-malware.html,2/15/2010,Remote File Inclusion (RFI),Application Misconfiguration,Planting of Malware,Government,"imereti, GE",No,,,,,,,,
-However, bosses at Facebook have hit out at the misuse of the information held on their site and said they will 'take appropriate action'.
-However, judging from the number and seriousness of the incidents reported on the web hacking incidents database, StrongWebmail is not alone and far stronger companies suffers severe incidents, making web applications the weakest link in an organizations information security.
-However, the statement issued by Van Morrison said: ""I have asked my management team to carry out an immediate investigation into a hacking attack which took place on my website on December 29th last.
-However, unlike the physical war in which only the Israeli military is conducting, in cyberspace Israelis join by themselves the hacking war. Artuz 7, an Israeli media site, reports that a group of students released a tool that perform distributed denial of service attacks against Hamas web sites. The students site itself provides news alerts about the cyber war between Israel and the Hamas.
-
-http://ads.cnn.com/event.ng/Type=click&Redirect=http:/bit.ly/cP???XW
-http://editor.conservatives.org.uk/cms/v6/cms.admin.php
-http://www.bathconservatives.com/
-http://www.frentesdeseguridad.gov.co (related to security in general). We tried to contact them and got no replies. We would wait a little more to publish it, but since clem1 mentioned them on our post about Georgia government sites hacked, I think it is time to use full-disclosure to get them fixed.",http://blog.sucuri.net/2010/02/colombia-government-sites-hacked-and-spreading-malware.html,2/18/2010,Remote File Inclusion (RFI),Application Misconfiguration,Planting of Malware,Government,Colombia,No,,,,,,,,
-http://www.frentesdeseguridad.gov.co (related to security in general). We tried to contact them and got no replies. We would wait a little more to publish it, but since clem1 mentioned them on our post about Georgia government sites hacked, I think it is time to use full-disclosure to get them fixed.",http://blog.sucuri.net/2010/02/colombia-government-sites-hacked-and-spreading-malware.html,2/18/2010,Remote File Inclusion (RFI),Application Misconfiguration,Planting of Malware,Government,Colombia,No,,,,,,,,
-http://www.newtonabbotconservatives.org.uk/
-http://www.nwdurhamconservatives.com/
-http://www.nwnorfolkconservatives.com/
-ICQ chat logs confirm SQL Injection was used - http://datalossdb.org/system/jcp_attachment.pdf",http://www.msnbc.msn.com/id/36088614/ns/technology_and_science-security/,10/23/2007,SQL Injection,Improper Input Handling,Credit Card Leakage,Retail,,No,,,,,,,,http://datalossdb.org/incident_highlights/48
-ICQ chat logs confirm SQL Injection was used - http://datalossdb.org/system/jcp_attachment.pdf",http://www.msnbc.msn.com/id/36088614/ns/technology_and_science-security/,10/23/2007,SQL Injection,Improper Input Handling,Credit Card Leakage,Retail,,No,,,,,,,,http://datalossdb.org/incident_highlights/48
-""If you got a weird tweet from me ignore it & do not click on the hyperlinks -they are prob viruses- my account was hacked by robospammers,"" he tweeted Wednesday morning. He noted later that he had ""fixed the account.""",http://thehill.com/blogs/twitter-room/other-news/118909-gop-lawmaker-my-twitter-account-was-hacked-by-robospammers,9/15/2010,Brute Force,Insufficient Authentication,Link Spam,Web 2.0,USA,No,,,,Twitter,,,,
-""If you got a weird tweet from me ignore it & do not click on the hyperlinks -they are prob viruses- my account was hacked by robospammers,"" he tweeted Wednesday morning. He noted later that he had ""fixed the account.""",http://thehill.com/blogs/twitter-room/other-news/118909-gop-lawmaker-my-twitter-account-was-hacked-by-robospammers,9/15/2010,Brute Force,Insufficient Authentication,Link Spam,Web 2.0,USA,No,,,,Twitter,,,,
-If you go the site and just type ""porkythepig"", a fragment of a movie begins to play. It's in Polish, of course - for those not fluent in Polish the man with a guitar sings: ""I'm a Happy Romek..."" * It's funny but the story is much more serious.
-If you then cross-reference this story with WHID entry 2009-51 where the Romania Hacker Unu released SQL Injection vulns in RBS WorldPay web applications, it seems most plausible that these Russian Hackers used similar vulnerabilities.",http://www.wired.com/threatlevel/2010/03/alleged-rbs-hacker-arrested,3/22/2010,SQL Injection,Improper Input Handling,Monetary Loss,Finance,"Georgia, USA",No,,,Russia,,,,,http://www.wired.com/images_blogs/threatlevel/2009/11/rbs-worldpay-indictment.pdf
-If you then cross-reference this story with WHID entry 2009-51 where the Romania Hacker Unu released SQL Injection vulns in RBS WorldPay web applications, it seems most plausible that these Russian Hackers used similar vulnerabilities.",http://www.wired.com/threatlevel/2010/03/alleged-rbs-hacker-arrested,3/22/2010,SQL Injection,Improper Input Handling,Monetary Loss,Finance,"Georgia, USA",No,,,Russia,,,,,http://www.wired.com/images_blogs/threatlevel/2009/11/rbs-worldpay-indictment.pdf
-???I got a text message saying Broken Arrow schools are closed.???
-Immediately before the fraud occurred, Mrs. McCarthy found that her Windows PC would no longer boot, and that the computer complained it could not find vital operating system files. ???She was using it one day and then this blue screen of death just came on her screen,??? said a longtime friend who was helping McCarthy triage her computer.
-In about six hours, he said, the group was able to scrape information for about 114,000 iPad 3G owners, but he did not say how many iPad owners could have been affected in total.",http://abcnews.go.com/print?id=10871229,6/9/2010,Credential/Session Prediction,Insufficient Anti-automation,Leakage of Information,Information Services,USA,No,,,,,,,,
-In about six hours, he said, the group was able to scrape information for about 114,000 iPad 3G owners, but he did not say how many iPad owners could have been affected in total.",http://abcnews.go.com/print?id=10871229,6/9/2010,Credential/Session Prediction,Insufficient Anti-automation,Leakage of Information,Information Services,USA,No,,,,,,,,
-In a disclosure letter (PDF) sent to the attorney general of New Hampshire Jan. 4, attorneys for the financial services firm revealed that a breach of the Lincoln portfolio information system had been reported to the Financial Industry Regulatory Authority (FINRA) by an unidentified source last August. The company was planning to issue notification to the affected customers on Jan. 6, the letter says.
-""In all likelihood, hackers have managed to poison some of the adverts that are being served to FarmTown by the outside advert provider,"" Cluley wrote on his blog.",http://news.cnet.com/8301-27080_3-20002267-245.html,4/12/2010,Malvertising,Improper Output Handling,Planting of Malware,Web 2.0,USA,No,,,,Facebook,,,,
-""In all likelihood, hackers have managed to poison some of the adverts that are being served to FarmTown by the outside advert provider,"" Cluley wrote on his blog.",http://news.cnet.com/8301-27080_3-20002267-245.html,4/12/2010,Malvertising,Improper Output Handling,Planting of Malware,Web 2.0,USA,No,,,,Facebook,,,,
-In a release, Al Jazeera claimed that for two hours this morning ??? from 6.30am to 8.30am Doha time ??? a banner advertisement was replaced with a slogan saying 'Together for the collapse of Egypt', which linked to a page criticising the broadcaster.",http://www.journalism.co.uk/news/al-jazeera-site-hacked-by-opponents-of-pro-democracy-movement-in-egypt/s2/a542649/,2/4/2011,Unknown,Improper Output Handling,Defacement,Media,"Dubai, Dubai",No,,,,,,,,
-In a release, Al Jazeera claimed that for two hours this morning ??? from 6.30am to 8.30am Doha time ??? a banner advertisement was replaced with a slogan saying 'Together for the collapse of Egypt', which linked to a page criticising the broadcaster.",http://www.journalism.co.uk/news/al-jazeera-site-hacked-by-opponents-of-pro-democracy-movement-in-egypt/s2/a542649/,2/4/2011,Unknown,Improper Output Handling,Defacement,Media,"Dubai, Dubai",No,,,,,,,,
-In a security blog posting made last night, Hyponnen said that, although the exploit mechanism is unclear, most of the compromised accounts ""seem to seem to belong to Israeli Twitter users.""",http://www.infosecurity-magazine.com/view/10426/major-hack-of-israeli-twitter-accounts-/,6/22/2010,Unknown,Unknown,Defacement,Web 2.0,Israel,No,,,Turkey,Twitter,,,,
-In a security blog posting made last night, Hyponnen said that, although the exploit mechanism is unclear, most of the compromised accounts ""seem to seem to belong to Israeli Twitter users.""",http://www.infosecurity-magazine.com/view/10426/major-hack-of-israeli-twitter-accounts-/,6/22/2010,Unknown,Unknown,Defacement,Web 2.0,Israel,No,,,Turkey,Twitter,,,,
-In a statement last week, a Poughkeepsie town official revealed that thieves had broken into the town's TD Bank NA account and transferred $378,000 to accounts in the Ukraine.",http://www.computerworld.com/s/article/9153598/Poughkeepsie_N.Y._slams_bank_for_378_000_online_theft,2/8/2010,Stolen Credentials,Insufficient Authentication,Monetary Loss,Finance,"NY, USA",No,,,Ukraine,,,,,
-In a statement last week, a Poughkeepsie town official revealed that thieves had broken into the town's TD Bank NA account and transferred $378,000 to accounts in the Ukraine.",http://www.computerworld.com/s/article/9153598/Poughkeepsie_N.Y._slams_bank_for_378_000_online_theft,2/8/2010,Stolen Credentials,Insufficient Authentication,Monetary Loss,Finance,"NY, USA",No,,,Ukraine,,,,,
-In a statement, the township police also warned the public that computer criminals have become more sophisticated.
-indeed been compromised.",http://www.theregister.co.uk/2011/01/25/fedora_server_compromised/,1/22/2011,Brute Force,Insufficient Authentication,Session Hijacking,Technology,,No,,,,,,,,
-indeed been compromised.",http://www.theregister.co.uk/2011/01/25/fedora_server_compromised/,1/22/2011,Brute Force,Insufficient Authentication,Session Hijacking,Technology,,No,,,,,,,,
-Information about the flaw was exposed by an anonymous hacker who gave the magazine a video demonstrating the error using a SQL injection attack. The hacker told the magazine that he made the flaw publicly available because there is no excuse for simple website mistakes. The website has since been taken offline.",http://itknowledgeexchange.techtarget.com/security-bytes/sql-injection-attack-used-in-breach-of-168000-netherlands-travelers/,5/18/2010,SQL Injection,Improper Input Handling,Leakage of Information,Government,Netherlands,No,,,,,,,,
-Information about the flaw was exposed by an anonymous hacker who gave the magazine a video demonstrating the error using a SQL injection attack. The hacker told the magazine that he made the flaw publicly available because there is no excuse for simple website mistakes. The website has since been taken offline.",http://itknowledgeexchange.techtarget.com/security-bytes/sql-injection-attack-used-in-breach-of-168000-netherlands-travelers/,5/18/2010,SQL Injection,Improper Input Handling,Leakage of Information,Government,Netherlands,No,,,,,,,,
-In November, unknown attackers based in Romania and Italy initiated a series of unauthorized wire transfers from Hillary's bank accounts and depleted it by $801,495. About $600,000 of the amount was later recovered by PlainsCapital.",http://www.computerworld.com/s/article/9149218/Bank_sues_victim_of_800_000_cybertheft,1/26/2010,Stolen Credentials,Insufficient Authentication,Monetary Loss,Finance,"TX, USA",No,,,Romania,,,,,
-In November, unknown attackers based in Romania and Italy initiated a series of unauthorized wire transfers from Hillary's bank accounts and depleted it by $801,495. About $600,000 of the amount was later recovered by PlainsCapital.",http://www.computerworld.com/s/article/9149218/Bank_sues_victim_of_800_000_cybertheft,1/26/2010,Stolen Credentials,Insufficient Authentication,Monetary Loss,Finance,"TX, USA",No,,,Romania,,,,,
-In order to purchase the monthly live membership, Gonzalez entered her credit card information to her son's online profile. It is suppose to be kept private but Gonzalez says her son's profile was hacked by a computer whiz.
-Interesting note - 18 House sites managed by GovTrends were defaced last August.",http://www.toptechnews.com/news/Hacker-Breaks-Into-49-House-Sites/story.xhtml?story_id=00100041BAO7,2/1/2010,Misconfiguration,Application Misconfiguration,Defacement,Government,USA,No,,,,,,,,
-Interesting note - 18 House sites managed by GovTrends were defaced last August.",http://www.toptechnews.com/news/Hacker-Breaks-Into-49-House-Sites/story.xhtml?story_id=00100041BAO7,2/1/2010,Misconfiguration,Application Misconfiguration,Defacement,Government,USA,No,,,,,,,,
- In the largest single attack, a hacker gained administrative access to the Direct Admin server management system used by a hosting provider, who Computerworld Australia will not name, and suspended 159 accounts rendering their web sites inaccessible to the public.
-It adds that it is likely that the Directors Desk hack was designed to plant malware on the systems of users via drive-by-download attacks.",http://www.theregister.co.uk/2011/02/07/nasdaq_malware_breach/,2/7/2011,SQL Injection,Improper Input Handling,Planting of Malware,Finance,USA,No,,,,,,,,
-It adds that it is likely that the Directors Desk hack was designed to plant malware on the systems of users via drive-by-download attacks.",http://www.theregister.co.uk/2011/02/07/nasdaq_malware_breach/,2/7/2011,SQL Injection,Improper Input Handling,Planting of Malware,Finance,USA,No,,,,,,,,
-""It allows any website to include, for example, a maliciously prepared iframe element that contains JavaScript or use the http-equiv attribute???s ???refresh??? value to redirect the browser to the prepared URL containing the JavaScript,"" explains Symantec. ""Any user who is logged into Facebook and visits a site that contains such an element will automatically post an arbitrary message to his or her wall.""",http://www.net-security.org/secworld.php?id=10814,3/29/2011,Cross Site Request Forgery (CSRF),Insufficient Process Validation,Disinformation,Web 2.0,USA,No,,,,Facebook,,,,
-""It allows any website to include, for example, a maliciously prepared iframe element that contains JavaScript or use the http-equiv attribute???s ???refresh??? value to redirect the browser to the prepared URL containing the JavaScript,"" explains Symantec. ""Any user who is logged into Facebook and visits a site that contains such an element will automatically post an arbitrary message to his or her wall.""",http://www.net-security.org/secworld.php?id=10814,3/29/2011,Cross Site Request Forgery (CSRF),Insufficient Process Validation,Disinformation,Web 2.0,USA,No,,,,Facebook,,,,
-It appears that the two Microsoft domains, which normally redirect users to login.live.com and il.msn.com, respectively, had their name server information altered. The new ns1.dollar2host.com and ns2.dollar2host.com name servers, which belong to a private Web hosting company, replaced the usual ns1.msft.net and ns2.msft.net that Microsoft used for its domains.",http://news.softpedia.com/news/Turkish-Hacker-Hijacks-CO-IL-MSN-and-Hotmail-Domains-144299.shtml,6/10/2010,DNS Hijacking,Insufficient Process Validation,Defacement,Information Services,,No,,,Turkey,,,,,
-It appears that the two Microsoft domains, which normally redirect users to login.live.com and il.msn.com, respectively, had their name server information altered. The new ns1.dollar2host.com and ns2.dollar2host.com name servers, which belong to a private Web hosting company, replaced the usual ns1.msft.net and ns2.msft.net that Microsoft used for its domains.",http://news.softpedia.com/news/Turkish-Hacker-Hijacks-CO-IL-MSN-and-Hotmail-Domains-144299.shtml,6/10/2010,DNS Hijacking,Insufficient Process Validation,Defacement,Information Services,,No,,,Turkey,,,,,
-It doesn???t look like it is being caused by the Russians or anything like that. And the attackers this time didn???t defaced their web page. They just added some malware and scripts to attack others.
-It emerged last week that several directors of Kalahari Resources had been removed with their names substituted.
-""It let me see all the files on the servers, passwords, user names. They did not make any effort to hide it,"" he said of the school board's IT department.",http://www.woodstocksentinelreview.com/ArticleDisplay.aspx?e=2815263,10/25/2010,SQL Injection,Improper Input Handling,Leakage of Information,Education,"London, Ontario, CA",No,,,,,,,,
-""It let me see all the files on the servers, passwords, user names. They did not make any effort to hide it,"" he said of the school board's IT department.",http://www.woodstocksentinelreview.com/ArticleDisplay.aspx?e=2815263,10/25/2010,SQL Injection,Improper Input Handling,Leakage of Information,Education,"London, Ontario, CA",No,,,,,,,,
-It might be that Facebook's recently proposed changes to its privacy settings could be to blame for the hiccup. PC World writer Paul Suarez reported that ""One of those changes [to Facebook's Privacy Policy and Statement of Rights and Responsibilities] would make it possible for Facebook to send your name, photo, friend list, and any public information about you and your friends to preapproved third-party Web sites."" A slight tweak to broadcasting profile information could have resulted in this embarrassing flub.",http://www.cio.com/article/589021/Facebook_Flub_Leaks_Private_E_Mail_Addresses,3/31/2010,Misconfiguration,Misconfiguration,Leakage of Information,Web 2.0,USA,No,,,,,,,,
-It might be that Facebook's recently proposed changes to its privacy settings could be to blame for the hiccup. PC World writer Paul Suarez reported that ""One of those changes [to Facebook's Privacy Policy and Statement of Rights and Responsibilities] would make it possible for Facebook to send your name, photo, friend list, and any public information about you and your friends to preapproved third-party Web sites."" A slight tweak to broadcasting profile information could have resulted in this embarrassing flub.",http://www.cio.com/article/589021/Facebook_Flub_Leaks_Private_E_Mail_Addresses,3/31/2010,Misconfiguration,Misconfiguration,Leakage of Information,Web 2.0,USA,No,,,,,,,,
-""It's absolutely real,"" he said, adding that the group gave the Gawker reporter their data set and he was able to verify the information.
-It said: ???The present indicators are that our database was breached to get email addresses and names for spamming",http://www.scmagazineuk.com/irish-recruitment-website-hacked-leading-to-the-breach-of-around-400000-user-details/article/196142/,2/8/2011,SQL Injection,Improper Input Handling,Leakage of Information,Recruitment,Ireland,No,,,,,,email addresses,400000,
-It said: ???The present indicators are that our database was breached to get email addresses and names for spamming",http://www.scmagazineuk.com/irish-recruitment-website-hacked-leading-to-the-breach-of-around-400000-user-details/article/196142/,2/8/2011,SQL Injection,Improper Input Handling,Leakage of Information,Recruitment,Ireland,No,,,,,,email addresses,400000,
-It says personal data may have been obtained by the hackers and customers should contact their banks to discuss cancelling their credit cards.",http://www.radionz.co.nz/news/national/68729/credit-cards-compromised-as-hackers-target-beauty-site,2/15/2011,SQL Injection,Improper Input Handling,Leakage of Information,Retail,New Zealand,No,,,,,,,,
-It says personal data may have been obtained by the hackers and customers should contact their banks to discuss cancelling their credit cards.",http://www.radionz.co.nz/news/national/68729/credit-cards-compromised-as-hackers-target-beauty-site,2/15/2011,SQL Injection,Improper Input Handling,Leakage of Information,Retail,New Zealand,No,,,,,,,,
-It???s not clear yet whether the point of compromise is a Wordpress vulnerability (users of the latest, patched version appear to be most affected), a malicious Wordpress plugin, or if a common service provider may be the culprit. However, nearly every site owner affected so far reports that Network Solutions is their current Web hosting provider.",http://krebsonsecurity.com/2010/04/hundreds-of-wordpress-blogs-hit-by-networkads-net-hack/,4/9/2010,Predictable Resource Location,Application Misconfiguration,Planting of Malware,Blogs,,No,,,,WordPress,,,,
-It???s not clear yet whether the point of compromise is a Wordpress vulnerability (users of the latest, patched version appear to be most affected), a malicious Wordpress plugin, or if a common service provider may be the culprit. However, nearly every site owner affected so far reports that Network Solutions is their current Web hosting provider.",http://krebsonsecurity.com/2010/04/hundreds-of-wordpress-blogs-hit-by-networkads-net-hack/,4/9/2010,Predictable Resource Location,Application Misconfiguration,Planting of Malware,Blogs,,No,,,,WordPress,,,,
-Its ""Short Breaks"" and Wine And Dine sections were both hacked, with the Short Breaks site still up at 12.55pm today, with a picture of a Romanian flag claiming to be for the ""Romanian National Security"", some comments in Romanian and the remark in English at the bottom that ""Guess what, gypsies aren't romanians, morons."" It also links to a Russian site which plays an MP3 called The Lonely Shepherd.
-It's unclear how the hack took place, but weak password security by the team of minions maintaining the page is the most likely explanation.",http://news.cnet.com/8301-27080_3-20029630-245.html,1/26/2011,Predictable Resource Location,Insufficient Authentication,Disinformation,Web 2.0,,No,,,,Facebook,,,,
-It's unclear how the hack took place, but weak password security by the team of minions maintaining the page is the most likely explanation.",http://news.cnet.com/8301-27080_3-20029630-245.html,1/26/2011,Predictable Resource Location,Insufficient Authentication,Disinformation,Web 2.0,,No,,,,Facebook,,,,
-""It was a joke,"" Darkc0ke said via e-mail. ""They didn't play the song. Why can't they do someone a favor, just for once?"" Darkc0ke said he cracked the database using a basic SQL injection to exploit a security vulnerability. The hacker is known for breaking into databases. Last year, he stole a database containing 46,000 e-mail addresses from the Dutch magazine Autoweek.",http://news.idg.no/cw/art.cfm?id=B143BFED-1A64-6A71-CE6E57CCCFC37786,5/19/2010,SQL Injection,Improper Input Handling,Leakage of Information,Media,Netherlands,No,,,,,,,,
-""It was a joke,"" Darkc0ke said via e-mail. ""They didn't play the song. Why can't they do someone a favor, just for once?"" Darkc0ke said he cracked the database using a basic SQL injection to exploit a security vulnerability. The hacker is known for breaking into databases. Last year, he stole a database containing 46,000 e-mail addresses from the Dutch magazine Autoweek.",http://news.idg.no/cw/art.cfm?id=B143BFED-1A64-6A71-CE6E57CCCFC37786,5/19/2010,SQL Injection,Improper Input Handling,Leakage of Information,Media,Netherlands,No,,,,,,,,
-""It was stunning, really, the number,"" said Thompson in an interview via instant message late Monday. ""And stunning that it was not viral or wormy [but that] Facebook did it all by itself.""
-It was the hacking equivalent of sitting outside the bank in a Ford Cortina, and checking your watch every time the rent-a-cop does his rounds and the bank manager pops out for his lunch-time massage.
-It was the latter, of course. To kill a bug that allowed a user to force other users to follow him or her, Twitter temporarily reset all follower/following counts to zero, according to the Twitter Status blog. Everything was back to normal by 11 a.m. Pacific.",http://www.pcworld.com/article/195962/,5/10/2010,Misconfiguration,Insufficient Process Validation,Disinformation,Web 2.0,USA,No,,,,Twitter,,,,
-It was the latter, of course. To kill a bug that allowed a user to force other users to follow him or her, Twitter temporarily reset all follower/following counts to zero, according to the Twitter Status blog. Everything was back to normal by 11 a.m. Pacific.",http://www.pcworld.com/article/195962/,5/10/2010,Misconfiguration,Insufficient Process Validation,Disinformation,Web 2.0,USA,No,,,,Twitter,,,,
-ive got this error while browsing some projects in jira http://tinyurl.com/XXXXXXXXX [obscured]
-Jan-01,WHID 2001-1: Travelocity exposes customer information,Sensitive files were left in a publicly accessible directory of a new web server install,http://news.com.com/2100-1017-251344.html?legacy=cnet,1/22/2001,Predictable Resource Location,Insufficient Authorization,Disclosure Only,Hospitality,,No,,,,,,,,
-Jan-02,WHID 2002-1: Flawed authentication at BN.com exposes personal information,"Opening an account with a discontinued e-mail address exposes all the information of the discontinues account
-Jan-03,WHID 2003-1: FTD.com hole leaks personal information,"
View other customers information by modifying a cookie
-Jan-04,"WHID 2004-1: Biggest Web Problem Isn't About Privacy, It's Sloppy Security - OpenTable","
Additional information:
-Jan-05,WHID 2005-1: Gmail Bug Exposes E-mails messages of other users,"Parameter tampering enabled exposing sensitive information in G-Mail
-Jan-06,WHID 2006-1: Google's Blogger HRS vulnerability,"
Additional information:
-Jan-07,WHID 2007-01: Credit Card Information stolen from Indiana's Web Site,"On January 3, a hacker broke into Indiana's government web site and made off with personal information for 71,000 health care aides who obtained certifications from the state, as well as 5,600 credit card numbers from people who had paid the state through the IN.gov web site.
-Jan-08,WHID 2008-01: Information stolen from geeks.com (Updated),"Update (Feb 8th 2009) - The company has reached a settlement with the FTC. Not a breathtaking achievement in the effort to make business care about web application security, yet a step in this direction. The report also identifies the attack as an SQL injection attack.
-Jan-09,WHID 2009-1: Gaza conflict cyber war,"Update (Jan 13, 2009) - Ynet, an Israeli paper, reports that many of the sites defaced where actually DNS hijacked following a break-in to the servers of DomainTheNet, an Israeli registrar. And just like other recent DNS hijacking incidents, the fault was lack of sufficient authentications and the hackers got hold of passwords to the administration system.
-Jan-10,"WHID 2010-1: Hacker Breaks Into 49 House Sites, Insults Obama","A hacker broke into 49 House Web sites of both political parties after President Obama's State of the Union address. The websites were all managed by a private vendor -- GovTrends of Alexandria, Va. The article mentions that ""GovTrends let its guard down while performing an update, allowing the hacker to penetrate sites of individual members and committees overnight"" which leads to WHID's Misconfiguration Attack Method designation.
-Jan-11,WHID 2011-1: Hackers hit Tunisian websites,"Online activists have attacked and at least momentarily disabled several Tunisian government websites in the latest act of protest against the country's embattled leadership.
-Jan-12,WHID-2012-1: PrivateX hacker group defaces Office of Vice President site again,"Hackers struck twice on New Year's Day, defacing another government website on Sunday evening and calling anew for ""information security"" but this time, also appearing to taunt its target.",http://www.gmanetwork.com/news/story/243236/scitech/technology/privatex-hacker-group-defaces-office-of-vice-president-site-again,1/1/2012,Unknown,Unknown,Defacement,Government,Phillipines,No,N/A,1,Unknown,Unknown,,,,
-Jan-99,WHID 1999-1: eBay downplays security hole,A very early XSS issue at eBay. Interesting historically as it seems that at the time the term XSS was not yet in use.,http://packetstormsecurity.org/9904-exploits/ebayla.txt,4/4/2006,Cross Site Scripting (XSS),Improper Output Handling,Session Hijacking,Retail,,No,,,,,,,,
-Jul-03,WHID 2003-7: Victoria's Secret reveals far too much,"View other customers orders by changing a sequential number within a URL parameter
-Jul-04,WHID 2004-7: More Scary Tales Involving Big Holes In Web-Site Security - University Sub Service,"
Additional information:
-Jul-05,WHID 2005-7: Hacker Tips Off B-School Applicants,"Parameter tampering to jump into someone else's account data
-Jul-06,WHID 2006-7: Google Reader "preview" and "lens" script improper feed validation,"
Google reader allows redirection so sites can fool users to subscribe to malicious content.
-Jul-07,"WHID 2007-07: Westerly Hospital data breach affects 2,000","
Personal information about 2,000 patients was mistakenly published on the hospital's web site. The leakage was discovered only when a patient found her information when ""Googling"" herself.
-Jul-08,WHID 2008-07: Another Free MacWorld Platinum Pass? Yes in 2008!,"
Kurt already got his free MacWorld pass last year (WHID 2007-14), but it seems that nothing changes year after year and he was able to pull a similar trick this year. As the codes that allow customers to get the passes where hashed but stored on the client browser, Kurt was able to crack them.
-Jul-09,WHID 2009-7: China's Yeepay.com Suffers Internet Payment Hacker Attack,"China retail news reports that Yeepay, a Chinese online payments provider suffered a major denial of service attack. The story seems to be big in China, but hardly made it to the west.
",,1/19/2009,Denial of Service,Insufficient Anti-automation,Downtime,Finance,China,No,,,,,,,,
-Jul-10,"WHID 2010-7: Hacker attacks Ceridian; data from 27,000 at risk","A hacker attack at payroll processing firm Ceridian Corp. of Bloomington has potentially revealed the names, Social Security numbers, and, in some cases, the birth dates and bank accounts of 27,000 employees working at 1,900 companies nationwide. The attack was against the Powerpay payroll system.",http://www.startribune.com/business/83505102.html?elr=KArksUUUU,1/20/2010,SQL Injection,Improper Input Handling,Leakage of Information,Finance,"Minnesota, USA",No,,,,,,,27000,
-Jul-11,WHID 2011-7: Hacker Breaks Into UConn Husky Store Website,"A hacker gained access to a database with the credit card information of 18,000 customers of the UConn Co-op's HuskyDirect.com website, the UConn Co-op said.","http://www.courant.com/business/hc-uconn-coop-data-breach-20110112,0,6878993.story",1/12/2011,SQL Injection,Improper Input Handling,Leakage of Information,Education,"Hartford, Connecticut",No,,,,,,,,
-Jul-12,WHID 2012-7: Subsidy Protest: EFCC site hacked with False arrests of oil moguls,"Nigerian hackers have tampered with the website of the Economic and Financial Crimes Commission, EFCC, www.efccnigeria.org, posting on the site the false ???arrests???of prominent Nigerian players in the oil sector.",http://pmnewsnigeria.com/2012/01/13/subsidy-protest-efcc-site-hacked-with-false-arrests-oil-moguls/,1/13/2012,Unknown,Unknown,Defacement,Government,Nigeria,N/A,N/A,1,Unknown,Unknown,,,,
-Jun-00,WHID 2000-6: Inforeading.com defacement using command injection,Executing local commands using URL parameters,http://www.inforeading.com/library/infoarticles/InfoReading/logs/deface/02.txt,12/15/2000,OS Commanding,Improper Input Handling,Defacement,Entertainment,,No,,,,,,,,
-Jun-01,WHID 2001-6: XSS at Microsoft Passport,,"http://www.pcworld.com/news/article/0,aid,69543,00.asp",11/5/2001,Cross Site Scripting (XSS),Improper Output Handling,Disclosure Only,Service Providers,,No,,,,,,,,
-Jun-03,WHID 2003-6: Mississippi man blackmails Best Buy,"A person convicted of blackmailing Best Buy. He threatened to expose a breach in the company's web site if not paid $2.5 million.
-Jun-04,WHID 2004-6: More Scary Tales Involving Big Holes In Web-Site Security - Tiffany,"
Additional information:
-Jun-05,WHID 2005-6: Tampering with parameters allows access to others account data on PayMaxx Inc. site,"Parameter tampering enabled jumping into someone else's account data on PayMaxx Inc. site
-Jun-06,WHID 2006-6: Hacker breaks into Buffalo sports site,"
A site of a minor league baseball team was hacked and personal details of fans was stolen.
-Jun-07,WHID 2007-06: Hackers swipe seed company's customers' data,"
11,500 credit card numbers have been stolen from the web site of Johnny's Selected Seeds a small ($13M in revenue per annum) on line vendor of seeds in Main. 20 of these are known to have been abused. As usual, the hack was discovered because of fraudulent use of stolen credit cards rather than security measures used protect the web site.
-Jun-08,WHID 2008-06: Hackers Take Down Pennsylvania Government,"
>
-Jun-09,WHID 2009-6: InfoGov switch hosting due to lack of security,"
This gem is taken out of a press release issued by a hosting provider. According to the press release, InfoGov, a UK provider of risk management solutions, switched hosting its sites to a new provider because the previous one did not provide adequate solution to an SQL injection attack that penetrated the site and inflicted Malware on InfoGov customers.
-Jun-10,WHID 2010-6: Cyber hacker hits Paula Dockery's campaign site,"Attacker(s) conducted a DDoS attack against the Florida Candidate for Governor Paula Dockery's website. In essence, what is happening is someone is sending approximately 40,000 requests per second to the website/server, then immediately closing them??_ It is the equivalent of 2.4 million people a minute browsing to the site and closing it immediately. In essence this saturates the number of connections available to legitimate people trying to get to the server, causing them to time-out when they visit the site. In security terms it is called a Denial of Service Attack (DoS).",http://blogs.tampabay.com/buzz/2010/01/cyber-hacker-hits-paula-dockerys-campaign-site.html,1/20/2010,Denial of Service,Insufficient Anti-automation,Downtime,Government,"Florida, USA",No,,,,,,,,
-Jun-11,WHID 2011-6: Whirlpool ISP hit by DDoS attack,"User forum Whirlpool was hit by a distributed denial-of-service (DDoS) attack last night, according to the site's hosting provider BulletProof Networks.
-Jun-12,WHID 2012-6: Radical Islamic Web Site Attacked by Hackers,"Arrahmah.com, a Web site categorized by the National Anti-Terrorism Agency and Indonesia???s largest Islamic group as promoting radical jihad and terrorism, could not be accessed on Tuesday, its editor said on Wednesday.",http://www.thejakartaglobe.com/media/radical-islamic-web-site-attacked-by-hackers/490668,1/10/2012,Denial of Service,Insufficient Anti-automation,Downtime,Media,Australia,,,1,Unknown,Unknown,Unknown,None,,
-Just clicking on the link to one of the applications that were taking advantage of the bug would allow the auto-posting to happen, Facebook said. The apps, which appeared to be sending people to a survey Web site, were disabled on Monday, the company said.
-Karen McCarthy said TDBank has dug in its heels and is now saying it has no responsibility for the loss.",http://www.krebsonsecurity.com/2010/02/n-y-firm-faces-bankruptcy-from-164000-e-banking-loss/,2/15/2010,Stolen Credentials,Insufficient Authentication,Monetary Loss,Finance,"NY, USA",No,,,,,,,,
-Karen McCarthy said TDBank has dug in its heels and is now saying it has no responsibility for the loss.",http://www.krebsonsecurity.com/2010/02/n-y-firm-faces-bankruptcy-from-164000-e-banking-loss/,2/15/2010,Stolen Credentials,Insufficient Authentication,Monetary Loss,Finance,"NY, USA",No,,,,,,,,
-Kutcher, best known for his role on the sitcom That 70's Show and, later, as host of MTV's Punk'd prank show, found himself Punk'd Toorcon style, when an unknown attacker hijacked an insecure Web session to post a message to Kutcher's Twitter account, @aplusk.
-Lastly, we should always remember that there is never perfect security. By making systems more secure we are just raising the price required to attack them and lowering the damage of such an attack, but never. As the old joke goes: the only secure system is one without users.",http://www.strongwebmail.com/secure/email/contests/hack/tc,6/10/2009,Cross Site Scripting (XSS),Improper Output Handling,Monetary Loss,Internet,USA,No,,,,,,,,
-Lastly, we should always remember that there is never perfect security. By making systems more secure we are just raising the price required to attack them and lowering the damage of such an attack, but never. As the old joke goes: the only secure system is one without users.",http://www.strongwebmail.com/secure/email/contests/hack/tc,6/10/2009,Cross Site Scripting (XSS),Improper Output Handling,Monetary Loss,Internet,USA,No,,,,,,,,
-Last week, Symantec, with the help of famed rapper Snoop Dogg, began promoting its new ???Hack is Wack??? marketing campaign for its Norton anti-virus products. As part of the effort, budding rappers are invited to post a video about cybercrime for a chance to win Snoop concert tickets and to hang out with his management team.",http://www.scmagazineus.com/symantec-secures-its-vulnerable-hack-is-wack-site/article/178388/,9/7/2010,Cross Site Scripting (XSS),Improper Output Handling,Defacement,Technology,,No,,,,,,,,
-Last week, Symantec, with the help of famed rapper Snoop Dogg, began promoting its new ???Hack is Wack??? marketing campaign for its Norton anti-virus products. As part of the effort, budding rappers are invited to post a video about cybercrime for a chance to win Snoop concert tickets and to hang out with his management team.",http://www.scmagazineus.com/symantec-secures-its-vulnerable-hack-is-wack-site/article/178388/,9/7/2010,Cross Site Scripting (XSS),Improper Output Handling,Defacement,Technology,,No,,,,,,,,
-Later, McCarthy???s friend would confirm that her system had been infected with the ZeuS Trojan, a potent family of malware that steals passwords and lets cyber thieves control the infected host from afar. ZeuS also includes a feature called ???kill operating system,??? which criminals have used in prior bank heists to effectively keep the victim offline and buy themselves time to make off with the cash.
-Leakage of information from an energy company is usually associated with gas stations fraud such as installing a stealth credit card reader at the pump. However, a report suggests that an incident in which information about 4500 Australian and 1400 Kiwis leaked was a result of a glitch in a web based application for applying for a Shell fuel card. The information obtained included company names, address details, email addresses and some bank account details.",http://www.stuff.co.nz/national/2269256/Hackers-steal-Shell-customer-info,2/17/2009,Unknown,Unknown,Leakage of Information,Retail,,No,,,,,,,5900,
-Leakage of information from an energy company is usually associated with gas stations fraud such as installing a stealth credit card reader at the pump. However, a report suggests that an incident in which information about 4500 Australian and 1400 Kiwis leaked was a result of a glitch in a web based application for applying for a Shell fuel card. The information obtained included company names, address details, email addresses and some bank account details.",http://www.stuff.co.nz/national/2269256/Hackers-steal-Shell-customer-info,2/17/2009,Unknown,Unknown,Leakage of Information,Retail,,No,,,,,,,5900,
-4chan distributed the simple get URL required to vote for moot through legitimate web sites and comment spamming. Such a link can easily be executed automatically by a web site user without his awareness using CSRF techniques.
-According to one comment, the site used an outdated version of WordPress, stressing again the problem with not upgrading in a timely manner, especially open source software.
-Security breach hits DivShare, unauthorized access to its database [Zdnet, Jun 19 2008]
-Cached Version [Bangkok Times (Google Cache), Jul 20 2008]
-MSN Site Hacking Went Undetected for Days [ABC News, Jun 3 2005]
- XSS Exploit at sms.ac [Addict3D, Jan 3 2006]
- eBay contains a cross-site scripting vulnerability [Addict3D, Apr 4 2006]
-Orkut XSS [Sounds From The Dungeon, Dec 19 2007]
-Hackers Force Pa. to Shut State Web Site [AP, Jan 4 2008]
-Hackers' posts on epilepsy forum cause migraines, seizures [AP, May 7 2008]
-Yahoo! Mail XSS Vulnerability [Cheng Peng Su, Apr 21 2006]
-XSS on Yahoo Mail [Bugtraq, Nov 23 2005]
-Zero Day Pizza Party - Yo Noid Advisory #00001 [""Full Disclosure"" Mailing List, Nov 7 2005]
-Ebay XSS [Full Disclosure, Feb 28 2006]
-Promotional firefox community site hacked [ars technica, Jul 15 2005]
-Promotional Firefox community site hacked (again) [ARStechnica, Oct 4 2005]
-Hackers hit Georgia Tech and steal personal info [Atlanta Business Chronicle, Feb 21 2007]
-Privacy breach at ISP [Australian IT, Mar 31 2006]
-Narodny Bezpecnostny Urad pwn3d (Slovak with Code Snippets [Blackhole.sk, Apr 25 2006]
-Knorr.de SQL Injection and XSS Vulnerabilities [Sebastian Bauer, Mar 2 2007]
-Google Fixes XSS Security Problem [Google Blogoscoped, Jul 6 2006]
-Forgotten your password? Google can find it for you. Unfortunately [Technology Guardian, Nov 23 2007]
-Indian SATs results leaking [Blog talkback, Mar 10 2005]
-When fixing is not enough [Securiteam, Dec 28 2007]
-MSNBC Turkish site caught serving malware [Zdnet, Nov 7 2007]
-Cyber Crooks Hijack Activities of Large Web-Hosting Firm [Washington Post, May 23 2007]
-Man Allegedly Bilks E-trade, Schwab of $50,000 by Collecting Lots of Free 'Micro-Deposits' [Wired, May 27 2008]
-Secret Service search warrant affidavit [Secret Service, May 7 2008]
-Blog Link Spam Claims Another Victim: Al Gore [Wired, Nov 27 2007]
-Abell's own report on the incident
-Cache Comes Back to Bite York County Constables [The Breach Blog, Sep 18 2007]
-Appeals Court's Opinion [, Nov 22 2005]
-Hacker installs malicious code on Dolphin Stadium website [CBS/AP, Feb 2 2007]
- Myspace Hack spreading like wildfire: SPAIRLKAIFS [Chase and Sam page, Jul 16 2006]
-Customer information compromised at bank [Columbia Tribune, Oct 10 2007]
-Web mail Incident Report [PlusNet, May 23 2008]
-One-at-a-time hacker grabs 22,000 IDs from Univ. of Missouri [Computerworld, May 9 2007]
-Soccer league's online shoppers get kicked by security breach [Computer World, Feb 8 2008]
- Responsible Disclosure? - Paypal vulnerable for two years [Computer World, Jul 20 2006]
-Geeks.com Website Hacked, Customer Data Stolen [Consumerist, ]
-Victoria's Secret reveals far too much [iAfrica, Oct 24 2003]
-XSS Worm At Justin.tv Affects 2525 Profiles [CyberInsecure, Jul 15 2008]
-Facebook vs. John Doe [US District Court, San Jose, CA, Oct 23 2007]
-May 2007 Security Incident [University of Missouri, May 8 2007]
-MLSgear.com Notification to NH DOJ [New Hampshire DOJ, Feb 1 2008]
-Scarborough & Tweed [State of New Hampshire, Oct 26 2007]
-Man arrested for hacking Internet shopping malls [The Hankyorea, Dec 17 2006]
-Stage 6 - Hacking [Wikipedia, Feb 9 2008]
-Super Bowl Dolphin Stadium Website Trojan [eSet, Feb 2 2007]
-MySpace XSS worm writer notes [bindshell, Apr 10 2005]
-AstraTel customer call records leaked [Public Forum, Mar 31 2006]
-Blogger Developers Network Blog Cracked [, Jul 31 2005]
-Your Free MacWorld Expo Platinum Pass (valued at $1,695) [Grutz, Jan 11 2007]
-Another Free MacWorld Platinum Pass? Yes in 2008! [Kurt Grutzmacher, Jan 14 2008]
-Online Games Are Written By Humans [Personal , Aug 29 2005]
-United Nations VS SQL Injections [Hackademix, Aug 12 2007]
-Cross Site Scripting Vulnerability in Google [ha.ckers, Jul 4 2006]
-My Lunch With Samy [ha.ckers, Mar 10 2007]
-TJMaxx XSS Vulnerability [RObert Hansen (Rsnake), Sep 23 2007]
-University of Chicago [Victim's Site, May 30 2005]
-Realplayer Vulnerability [SANS Internet Storm Center, Jan 4 2008]
-yl18.net mass defacement [SANS ISC, Nov 6 2007]
-Mass exploits with SQL Injection [SANS, Jan 9 2008]
-SQL Injection Worm on the Loose [SANS Internet Storm Center, May 7 2008]
-Santy worm defaces websites using php bug [Sans Storm Center, Dec 21 2004]
-Barnes & Noble.com Fined for Customer Data Leak [Datamation, Apr 30 2004]
-Gmail Messages Are Vulnerable To Interception [Slash.Dot, Jan 12 2005]
- $1,000,000 CNBC stock trading contest hacked [ Jeremiah Grossman, Jun 11 2007]
-It pays to be a hacker [Jeremiah Grossman, Feb 19 2008]
-More Google security failures [Jibbering.com, Nov 16 2005]
-Hackers swipe seed company's customers' data [Kennebec Journal, Mar 3 2007]
-How the myspace SWF hack worked [Unknown, Jul 16 2006]
-Google Reader ""preview"" and ""lens"" script improper feed validation [Full Disclosure, Feb 22 2006]
-Data Mining Myspace Bulletins [Full Disclosure Mailing List, Jun 30 2006]
-Defacement of several Novell websites [Mailing list post, Oct 4 2005]
-Private records discovered on server [Chicago Maroon, May 27 2005]
-Hacking John McCain [, Mar 27 2007]
-MySpace XSS virus development [bindshell, Apr 10 2005]
-NetLife Exclusive: Security hole found in Gmail [Nana NetLife, Oct 27 2004]
-Santy worm makes unwelcome visit [BBC, Dec 22 2004]
-Cahoot hit by web security scare [BBC, Oct 5 2004]
-UN's website breached by hackers [BBC, Aug 13 2007]
-CNet
-Web designer sentenced for hacking competitor's site [CNet, Aug 14 2007]
-Oops! John McCain's MySpace page gets pranked [CNet, Mar 27 2007]
-Macworld crack offers VIP passes, hacker says [CNet, Jan 12 2007]
-Tower Records site exposes data [CNet, Dec 5 2002]
-FTD.com hole leaks personal information [CNet, Feb 13 2003]
-Reuters accused of hacking [Cnet, Nov 29 2002]
-Cisco warns customers of site breach [Cnet, Mar 8 2005]
-Firefox marketing site hacked [C-Net, Jul 15 2005]
-Google fixes security flaw in Reader [News.com, Jul 5 2006]
-Google fixes Web site security bug [News.com, Oct 10 2005]
-Google plugs 'obscure' phishing holes [CNet, Dec 21 2005]
-Intruder adds back door to WordPress blog software [News.com, Mar 6 2007]
-Microsoft plugs phishing hole in Xbox site [news.com, May 25 2005]
-MSN flaw put Hotmail accounts at risk [CNet, Jun 6 2005]
-PayPal fixes phishing hole [News.com, Jun 16 2006]
-Payroll site closes on security worries [CNet, Feb 23 2005]
-Phishers set hidden traps on eBay [CNet, Mar 31 2006]
-Pizza chain caught without fully baked security [Cnet, Nov 7 2005]
-Yahoo fixes Web mail security flaw [News.com, Oct 21 2005]
-NUJP website defacement seen not related to political crisis [inq7, Mar 2 2006]
-Phishers Manipulate SunTrust Site to Steal Data [NetCraft, Sep 28 2004]
-SunTrust site exploited by fraudsters [NetCraft, Dec 6 2004]
-US Government Security Site Vulnerable to Common Attack [NetCraft, Dec 14 2005]
-PayPal Security Flaw allows Identity Theft [Netcraft, Jun 16 2006]
-PayPal XSS Exploit available for two years? [Netcraft, Jul 20 2006]
-Hacked HostGator Sites Distribute IE Exploit [NetCraft, Sep 22 2008]
-HostGator: cPanel Security Hole Exploited in Mass Hack [NetCraft, Sep 23 2007]
-Italian Bank's XSS Opportunity Seized by Fraudsters [NetCraft, Jan 8 2008]
-Hacker Conquer French Embassy In Libya Webiste [Portalit, Dec 14 2007]
-UI Notifies Graduate Program Students, Faculty About Security Breach [Univ. Of Iowa, May 19 2007]
-Music Web Site: Breach Exposed Accounts [AP, Mar 16 2006]
-Mississippi man denies Best Buy blackmail [ZDnet, Jan 7 2004]
-Firefox marketing site hacked [Zdnet, Jul 15 2005]
-Police blotter: Best Buy 'hacker' loses in court [Zdnet, Dec 2 2005]
-Google fixes 'minor' Gmail flaw [ZDnet, Feb 2 2006]
-Microsoft faces huge fine over security [Zdnet, May 9 2003]
-Mistake left constables open to ID theft -- Clerk of Courts posted Social Security numbers online [York Dispatch, Sep 17 2007]
-Blogger.com classic HTTP response splitting vulnerability [, Jan 2 2006]
-Froogle XSS [Packet Storm, ]
- Vulnerability in Gmail [Ph3rny's Blog, ]
-HBS/ApplyYourself Admit Status snafu [Personal Blog, Mar 2 2005]
-Internet Retailer Publisher Victim Of Customer File Hack [NBC.com, Sep 18 2007]
-This link runs a slooow SQL query on the RIAA's server. Don't click it; that would be wrong [Reddit, Jan 20 2008]
-XSS on Yahoo Mail [Bugtraq, Nov 23 2005]
-A New Phishing Variation [John S. Quarterman, Mar 24 2006]
-Bugzilla Bug 187971 - Gentoo Website Command Injection Issue [Gentoo, Aug 7 2007]
-Cleaning up after a hack job: CardSystems' Christensen [Information Security (mirror), Apr 14 2006]
-Netscape.com hit with cross-site scripting attack [Search Security, Jul 26 2006]
-A security tale: From vulnerability discovery to disaster [Search Security, Jun 14 2004]
-XSS vulnerability on various german online banking sites [Full Disclosure, May 17 2007]
-Google XSS (1) [Bugtraq, Apr 10 2006]
-Google XSS (2) [Bugrtaq, Apr 10 2006]
-SQL Injection in incredibleindia.org [Susam Pal, Apr 16 2006]
-Sourceforge XSS [Bugtraq, Feb 24 2006]
-Microsoft MSN Hotmail : Cross-Site Scripting Vulnerability [Bugtraq Archives, Mar 23 2006]
-libero.it XSS vulnerability - HTML injection [Bugtraq (Posted by Davide Denicolo), May 2 2006]
-Alexadex.com players.py XSS Exploit [Bugtraq, May 5 2006]
-URL Bug On 1ASPHost and DomainDLX Hosting Services [Bugtraq, Jun 6 2006]
-Alert - Yahoo! Mail XSS vulnerability [Cesar Cerrudo, Argeniss, Apr 28 2006]
-Hacker hits Duke system [The News Observer, Jun 5 2005]
-Web sites get costly lesson in security [Asahi (Japan), May 18 2005]
-Sourceforge.net XSS [Vulnerability Development, Apr 9 2006]
-Convenience or just bad design? [WebAppSec, Jul 12 2006]
-Tlen.PL e-mail XSS vulnerability [Tomasz Koperski, ]
-Company press release, December 23rd 2008
- Software glitch reveals private data for thousands of state's students
-Google's XSS Vulnerability [Chris Shiflett, Dec 21 2005]
-Google XSS Example [Chris Shiflett, Dec 21 2005]
-Biggest Web Problem Isn't About Privacy, It's Sloppy Security [Wallstreet Journal (Archive Copy), Jan 26 2004]
-More Scary Tales Involving Big Holes In Web [Wallstreet Journal (Archive Copy), Feb 2 2004]
-More Scary Tales Involving Big Holes In Web-Site Security [Wallstreet Journal (Archive Copy), Feb 2 2004]
-Police investigate charity credit card data hack [Silicon.com, Dec 12 2005]
-Security flaw exposed in Cahoot bank accounts [Silicon.com, Oct 5 2004]
-Leader: Not another security scare [Silicon.com, Oct 5 2004]
-StopBadware.org Identifies Companies Hosting Large Numbers of Websites That Can Infect Internet Users With Badware [StopBadware, May 4 2007]
-Breaking: Bank of India seriously compromised [Sunblet Blog, Sep 2 2007]
-Data Theft Incident Response [UofT, Sep 7 2005]
-Cisco Connection Online Compromised? [TaoSecurity Blog, Mar 8 2005]
-User data stolen but not unsecured [Private Bay, May 11 2007]
-Vodafone blocks website after hacking [Times of India, Nov 7 2007]
-Harvard Site Hacked and Leaked on BitTorrent [TorrentFreak, Feb 18 2008]
-RIAA Website Wiped Clean by ""Hackers"" [Torrent Freak, Jan 20 2008]
-Unibanco tem brecha em sistema de comprovantes de transa??es online [IDG Now (Google Translate), Jan 29 2007]
-Harvard Web Site Hack is a Cautionary Tale [Virtualization News Desk, Feb 19 2008]
-The Washington Post's analysis of the incident
-Harvard Joomla site hacked: things to learn? [James Walker, Feb 19 2008]
-VP contender Sarah Palin hacked [Wiki Leaks, Sep 16 2008]
-Midrange CardSystems Wiki [Midrange, ]
-BN.com: The Hole Story [Wired, Jul 19 2002]
-WodPress dangerous, Upgrade [, Mar 2 2007]
-Breaking News: Files From Google On the Streets [The Hacker Webzine, May 30 2007]
-Foxnews File Disclosure [The Hacker Webzine, Jul 23 2007]
-Yahoo RSS XSS Vulnerability [alljer.com, Dec 18 2005]
-Belgian defense ministry web site remains off line after weekend hacking [Associated Press, Jan 15 2007]
-THAILAND: ICT Ministry website sabotaged by hacker [Bangkok Times, Jul 20 2007]
-Hackers Block Sale of Colorado Rockies World Series Tickets [Associated Content, Oct 24 2007]
-Microsoft Patches .NET Passport Hole [AnyNetwork, May 8 2003]
-eBay Explains Security Hole Used by Hacker [Action Bytes, Oct 9 2007]
-McAfee: DNSChanger Trojans v4.0, Dec 4th 2008
-USDA admits data breach, thousands of social security numbers revealed [Axcess News, Apr 23 2007]
-College glitch avails student information to public [The Arizona Republic, Mar 10 2007]
-AOL Fixes Netscape.com XSS Hack [Beta News, Jul 26 2006]
-Cisco Web Site Breached by Hackers [Beta News, Mar 8 2005]
-Cross-Site Scripting Worm Hits MySpace [Beta News, Apr 10 2005]
-eBay Redirect Becomes Phishing Tool [Beta News, Mar 3 2005]
-Gmail Bug Exposes E-mails to Hackers [Beta News, Jan 12 2005]
-Google Cross-Site Scripting Flaw Fixed [Beta News, Dec 21 2005]
-Advogato xss virus account [Bindshell, Sep 21 2002]
-MySpace XSS worm source [bindshell, Apr 10 2005]
-Making money with Myspace bulletin system! [, Jun 16 2006]
-Insurer's website breach reveals data on drivers [The Boston Globe, May 5 2005]
-Hacker gains access to Bisons fans' Web data [The Buffalow News, Mar 14 2006]
-XSS flaw makes PM say: ""I want to suck your blood"" [Builder.AU, Oct 9 2007]
-CNBC's Easy Money [Business Week, Jun 7 2007]
-Boy, 12, referred to child guidance center for hacking into online game site [Manchini Daily News, Sep 7 2005]
-Passport Canada strengthens online security following breach [CBC, Dec 4 2007]
-Victoria's Secret Reveals Too Much [CBS News, Oct 22 2003]
-Hacker attacked weak point on Kakaku.com's Web Site [Asahi (Japan), May 25 2005]
-Orkut XSS worm in the wild [CGI Security, Dec 19 2007]
-Man logs into dabs.com customer account shocker [channel register, Aug 18 2005]
-Pulled in All Directions [CIO Asia, Jan 1 2006]
-NISCC reveals SAP R/3 security flaw [Computer Weekly, Jul 28 2005]
-Hackers jack Monster.com, infect job hunters [Computer World, Nov 20 2007]
-Update: 'Hacker safe' Web site gets hit by hacker [Copmuter World, Jan 7 2008]
-Harvard Web site hacked; database on file-sharing site [Computer World, Feb 18 2008]
-Hackers access personal info on faculty members at Univ. of Virginia [Computer World, Jun 11 2007]
-Cisco.com passwords reset after Web site exposure [Computer World, Mar 8 2005]
-UT Austin hack yields personal info on thousands [Computer World, Mar 6 2003]
-Santy.E worm poses threat to sites badly coded in PHP [Computer World, Dec 27 2004]
-Privacy Fears Prompt CVS To Turn Off Online Service [Computer World, Jun 27 2005]
-Chinese hacker held in Web data theft [Asahi Shimbun, Jul 7 2005]
-Hacker diverts traffic from city's Web page [ContraCosta times, Jan 17 2006]
-OSU breach raises fears of ID theft [cr80 News, May 16 2008]
-Nosy hacker alters sheriff's news releases [The Daily Bulletin, Jun 22 2008]
-Collective effort restores David Airey.com [David Airey, Dec 27 2007]
-WARNING: Google's Gmail security failure leaves my business sabotaged [David Airey, Dec 24 2007]
-Davidson Companies Informs Clients of Network Intrusion Resulting in Illegal Access to Personal Data [Davidson Companies, Jan 30 2008]
-Feds take over municipal court Web hacking probe [Columbus Dispatch, Dec 20 2007]
-Ministry websites hit by hacker intrusion [Kathimerini, Jan 31 2008]
-Gmail bug [elhacker.net, Oct 18 2005]
-Information Security Series: Security Practices - Integrated Contract Management System [EPA, Jan 31 2006]
-Google Plugs Cookie-Theft Data Leak [eWeek, Jan 14 2005]
-SpreadFirefox Site Hacked, Data Leaked [eWeek, Jul 15 2005]
-Google Downplays Gmail Security Fix [eWeek, Oct 18 2005]
-Cisco Web Portal Password Security Compromised [eWeek, Mar 8 2005]
-Breach in Fla. donor registry may have exposed IDs [Associated Press, Jul 7 2008]
-GSA takes down eOffer after finding security flaw [Federal Computing, Jan 13 2006]
-Hackers steal credit card info from R.I. Web site [Federal Computer Week, Jan 27 2006]
-AHCA Incident PR [AHCA, Jul 7 2008]
-AHCA Incident Faq [AHCA, ]
-The Financial Express, Dec 25th 2008
-High School Hackers Cancel School With Fake Snow Day [http://www.firstcoastnews.com/news/strange/news-article.aspx?storyid=75657, Feb 9 2007]
-Do Online Banks Facilitate Fraud? [The Motley Fool, Dec 8 2004]
-Dallas Police Web Site Hacked, Defaced [Fox (AP), Feb 19 2008]
-PHP Scripts Automated Arbitrary File Inclusion [Vulnerabiliy Publisher's Site, Dec 25 2004]
-Netscape.com hacked [F-Secure, Jul 26 2006]
-Guess Settles FTC Security Charges [FTC Web Site, Jun 18 2003]
-ValueClick to Pay $2.9 Million to Settle FTC Charges [Federal Trade Commision, Mar 17 2008]
-FTC complain In the Matter of CardSystems Solutions [FTC, ]
-United States Of America Federal Trade Commission In The Matter Of Guidance Software, Inc. [Federal Trade Commission, Apr 1 2007]
-n the Matter of Life is good, Inc., a corporation, and Life is good Retail, Inc., a corporation. FTC Matter No. 072-3046 [Federal Trade Commission, Jan 17 2008]
-Pennsylvania State Disconnects from Internet Over Chinese Hacker Phearz [Geeks Are Sexy, Jan 9 2008]
-Analysis and Timeline of the Nuthatch exploitation attempts [Gentoo, ]
-Log of all usages of the exploit [Gentoo, ]
-Google GMail E-mail Hijack Technique [GNUcitizen, Sep 25 2007]
-The Orkut XSS Worm [GNU Citizen, Dec 19 2007]
- Security gaps found in EPA contracting system [GovExec, Feb 3 2006]
-Hacker steals Davidson Cos. clients' data [Great Falls Tribune, Feb 4 2008]
-Davidson Co.'s security breach reminds that personal data isn't as safe as we'd like [Great Falls Tribune, Feb 11 2008]
-US Gov sites Hacked with SQL Injection [Bill Pennington, Nov 9 2008]
-Theft of credit card data affects tens of thousands of Kartenhaus customers [Heise, Oct 5 2007]
-Massive embedded exploit web site attack underway [Heise, Jan 8 2008]
-Symantec reports first active attack on a DSL router [Heise, Jan 24 2008]
-Server hacked through holes in Confixx management software [Heise Security, Aug 1 2007]
-Data lapse involved 51,000, St. Vincent says [Indy Star, Jul 25 2007]
-Hackers Make Off With Personal Info On Applicants At UC Davis [Information Week, Jun 28 2007]
-Hacker Suspected Of Multistate Break-In Spree [Information Week, Mar 23 2007]
-Two Universities Hit By Security Breaches [Information Week, Jun 11 2007]
-IndiaTimes.com Visitors Risk High Exposure To Malware [Information Week, Nov 9 2007]
-'Hacker Safe' Geeks.com Hacked [Information Week, Jan 7 2008]
-70,000 Web Pages Hacked By Database Attack [Information Week, Jan 8 2008]
-Online Retailer Settles Charges That It Left Consumer Data Open To Hackers [Information Week, Jan 18 2008]
-Two Universities Hit By Security Breaches [Information Week, Jun 11 2007]
-Petco settles charge it left customer data exposed [Infoeworld, Nov 17 2004]
-Guidance Software Investigating Stolen Data [Internet News, Dec 20 2005]
-FTC Approves Final Guidance Settlement [Internet News, Apr 3 2007]
-Student Indicted in Palin E-Mail Hack [Internet News, Oct 8 2008)
-Internet News, December 24th 2008
-The day my web site was hacked [IT Week, Dec 17 2007]
-County's Web site hacked; no data lost [Journal Gazetter, Aug 28 2007]
-KU shuts down housing application Web site [Associated Press, Dec 27 2005]
-Upgrade and new theme [Light Blue Touchpaper Blog, Oct 27 2007]
-Google as a password cracker [Light Blue Touchpaper Blog, Nov 16 2007]
-Wordpress cookie authentication vulnerability [Light Blue Touchpaper Blog, Nov 20 2007]
-Hackers Take Down Pennsylvania Government [Linux Journal, Jan 10 2008]
-How Paris Got Hacked? [O'Reilly Network, Feb 22 2005]
-Phishers hack eBay [MacWorld, Aug 2 2005]
-Nokia website hacked [Mad4mobilephones, Jan 29 2007]
-Art.com says hacker accessed names, credit cards [MarketWatch, Oct 28 2007]
-BarnesAndNoble.com Security Flaw [Personal Web Page, Jul 9 2002]
-Orkut Worm Code (and why was Google so slow to respond?) [TechnoSocial, Dec 19 2007]
-Media Bistro
-Hacker sabotages Peru president's Web site [Middle East Times, Jul 26 2007]
-Mail & Guardian, Aug 15th 2008
-SQL Injection Attack Infects Thousands of Websites [Ryan Barnett, Jan 8 2008]
-MSU investigating hacking incident [Montana's News Station, Oct 16 2007]
-More Social Security numbers leaked at MSU [Montana's News Station, Nov 7 2007]
-Everyone.net XSS [Simo Ben Youssef, Feb 12 2006]
-Hotmail Cross Site Scripting [Simo Ben Youssef, Feb 20 2006]
-ICQ Cross Site Scripting [Simo Ben Youssef, Jan 10 2006]
-Yahoo mail Cross Site Scripting [Morx, Dec 22 2005]
-Hacker accessed data at University of Missouri [MSNBC, May 8 2007]
-Hacking hotmail, by Alex de Vries [Personal Web Page, Jun 4 2005]
-SpreadFirefox.com Community Website Hacked Once Again [ARStechnica, Oct 4 2005]
-BusinessWeek website attacked and hosts malware [Net-Security, Sep 15 2008]
-Palin's private e-mail hacked, posted to 'Net [Network Wold, Sep 17 2008]
-Mozilla marketing site hacked [Network World, Jul 15 2005]
-Teenager claims to find code flaw in Gmail [Network World, Feb 3 2006]
-SQL attacks lob onto tennis association Web site [Network World, Jul 4 2008]
-Network World, June 8th 2008
-Hacking of CM's website: Interpol's help sought [NewindPress, Jun 10 2007]
-Hacker halts Rivkin auction of 37 watches [Herald Sun, Nov 5 2007]
-Infamous Russian malware gang vanishes [News.com, Nov 9 2008]
-Identity theft in Hyde Park [nrg.co.il, Feb 16 2005]
-Large Scale Breakin to Israblog [NRG (Hebrew), Apr 5 2006]
-Advisory: ICQmail.com & Mail2World.com (ms_inbox.asp Current_folder) XSS vulnerability [NukedX, Feb 25 2006]
-Security Breach at LexisNexis Now Appears Larger [New York Times, Apr 13 2008]
-Make Big Profits Illegally (and Maybe Keep Them, Too) [New York Times (free subscription required), Feb 15 2008]
-No classified data lost in cyber attacks - Clark [The New Zealand Herald, Sep 11 2007]
-Hacker uses Social Security numbers from Ohio court site [Ohio.com/AP, Dec 22 2007]
-School Web site breached? Personal info of Pembroke workers, volunteers accessible for months [Patriot Ledger, Oct 11 2007]
-Westerly Hospital data breach affects 2,000 [Providence Business News, Mar 2 2007]
-MSN Site Flaw Exposes Hotmail Accounts to Prying Eyes [PC Magazine, Jun 7 2005]
-Hacker takes $50,000 a few cents at a time [PC Pro, May 28 2008]
-Microsoft.co.uk Succumbs to SQL Injection Attack [PC world, Jun 29 2007]
-Malicious Code Infects Chinese Security Site [PC World, Oct 3 2007]
-Hacker Breaks Into eBay Server, Locks Users Out [PC World, Oct 8 2007]
-Another inconvenient truth: Al Gore's Web site hacked [PC World, Nov 26 2007]
-New Variant of Santy Worm Spreads [PC World, Dec 27 2004]
-Paris Hilton: Victim of T-Mobile's Web Flaws? [PCWorld, Mar 1 2005]
-Google Base launched with security hole [PC World, Nov 21 2005]
-N.C. woman admits 400G scam of QVC [Phily.com, Oct 26 2007]
-Teen arrested for hacking Belgian police website [Physorg.org, Jun 25 2007]
-570 Scarborough & Tweed customers' personal information accessed by SQL injection [PogoWasRight.Org, Nov 3 2007]
-Officials say no data was compromised by hackers [Post Gazette, Jan 6 2008]
-Massachusetts Teen Convicted for Hacking into Internet and Telephone Service Providers [Press Release, Sep 8 2005]
-Maine Seed Company Website Hacked: Demonstrates SMB Vulnerability & Questions Hacker Safe Seals [Realtime IT compliance, Mar 3 2007]
-US Embassy probes hacking of online visa appointment system [RJR 94FM, Jun 13 2007]
-CardSystems Exposes 40 Million Identities [Bruce Schneier, Jun 23 2005]
-Vote Someone Else's Shares [Bruce Schneier, Nov 24 2005]
-RPG site bit by hackers [SC Mazagine, Dec 21 2005]
-Political hacking hits MySpace [SC Magazine, Jul 17 2006]
-Harvard grad school site hacked, files distributed on BitTorrent network [SC Magazine, Feb 19 2008]
-SC Magazine, Aug 12th 2008
-Lycos Free Email Cross-Site Scripting Vulnerability [SecriTeam, Dec 27 2004]
-Example of the worst passwd recovery interface [WebAppSec mailing list, Aug 3 2005]
-National Secret Agency of Slovak Republic [Incidents Mailing List, Apr 26 2006]
-Chinese servers host malicious cursor attacks [Security Focus, Mar 30 2007]
-Pirate Bay breach leaks database [Security Focus, May 14 2007]
-Hackers steal names, Social Security numbers from University of Texas database [Security Focus, Mar 6 2006]
-Car shoppers' credit details exposed in bulk [Security Focus, Sep 25 2003]
-FTC investigates PetCo.com security hole [Security Focus, Dec 5 2003]
-Defenses lacking at social network sites [Security Focus, Dec 31 2003]
-Pranksters bedevil TV weather announcment system [Security Focus, Mar 4 2004]
-Tower Records settles charges over hack attacks [Security Focus, Apr 21 2004]
-Petco settles with FTC over cyber security gaffe [Security Focus, Nov 17 2004]
-Netscape Hacked, Professor Denies Sexiness Claims [SecurityPro News, Jul 26 2006]
-New SQL Injection Attacks and New Malware: winzipices.cn [ShadowServer, May 7 2008]
-Critical Myspace Vulnerabilities Leave Every Active Account Exploitable [Silent Productions, Dec 5 2005]
-Myspace.com - Intricate Script Injection Vulnerability [Justin Lavoie, Apr 5 2006]
-McAfee SiteAdvisor [McAfee, ]
-Graham Cluley's blog entry, Aug 11th 2008
-UI put staff data on Web [Spokesman Review, Mar 10 2007]
-Spread Firefox Downtime [Spread Firefox, Jul 15 2005]
-FTC Wags Finger At Site For Weak Consumer Data Security [Storefront Backtack, Jan 18 2008]
-Hackers hit New Zealand Herald website [Stuff, Aug 29 2007]
-Google's Advanced Search Operators Abused by Spammers [Symantec Response Team, Nov 2 2007]
-Drive-by Pharming in the Wild [Symantec, Jan 22 2008]
-Teenage hacker facing court case for data theft [Taipe Times, Jan 22 2006]
-Banks pull plug on Web sites [Tallahassee Democrat, Mar 17 2006]
-Hackers create a new scam [Tallahassee Democrat, Mar 18 2006]
-Hackers Tap Banks' Web Sites In Unique Phishing Attack [TechWeb, Mar 29 2006]
-Woman scammed QVC for $400,000+ in Internet glitch [TG Daily, Oct 30 2007]
-Hacker breaks into Ecuador's presidential website [Thaindian News, Feb 11 2008]
-Porn and privacy: Big Brother's big bother [The Age, Apr 23 2007]
-Hacker Tips Off B-School Applicants [The Crimson, Mar 3 2005]
-The Dark Visitor
-Passport applicant finds massive privacy breach [The Globe and Mail, Dec 4 2007]
-Hacker Accesses Credit Card Info On State Web Site [The Indy Channel, Feb 9 2007]
-State Notifies 71,000 Workers Of Web Site Breach [The Indy Channel, Mar 21 2007]
-State: Web Site Breach May Have Been Prank [The Indy Channel, Mar 22 2007]
-Hacker forced new planet discovery out of the closet [The Inquierer, Aug 1 2005]
-Pirate Bay says stolen database safe [The Inquierer, May 14 2007]
-Fox News leaks secret files [The Inquierer, Jul 24 2007]
-Hacker Redirects Bank Customers To Phony Site [The Kensas City Channel, Nov 27 2006]
-Former Fruit of the Loom workers' identities compromised [The Northwest Georgian, Feb 23 2007]
-Student owns up to Texas Uni cyber-heist [The Register, Mar 18 2003]
-Gmail accounts 'wide open to exploit' - report [The Register, Oct 29 2004]
-Google plugs brace of GMail security flaws [The Register, Jan 14 2005]
-Hotmail users exposed to cookie snaffling exploit [The Registrer, Jun 8 2005]
-MS UK defaced in hacking attack [The Register, Jul 6 2005]
-Forgotten password clues create hacker risk [The Register, Mar 20 2006]
-PlusNet blames itself for webmail spamfest [News Story, May 24 2007]
-Gentoo cuts key parts of itself from net for its own good [The Register, Aug 17 2007]
-Web host breach may have exposed passwords for 6,000 clients [The Register, Sep 19 2007]
-US regional bank hacked [The Register, ]
-Hacker defaces temples to OS X [The Register, Nov 27 2007]
-Facebook sues Canadian smut firm over hacking [The Register, Dec 17 2007]
-Indonesian hacker touches souls by bringing down police web site [The Register, Dec 20 2007]
-RIAA wiped off the net [The Register, Jan 21 2008]
-Hacker holds onto ill-gotten gains thanks to US courts [The Register, Feb 17 2008]
-eBay dumps ValueClick [The Register, Mar 17 2008]
-Office of Nation's Top Spy Inadvertently Reveals Key to Classified National Intel Budget [The Spy Who Billed Me, Jun 3 2007]
-Facebook suing Ontario porn firm [The Star, Dec 16 2007]
-Sony PlayStation
-Think Discovers Critical Flaws in U.S. Transportation Security [Vulnerabiliy Publisher's Site, Feb 1 2005]
-Think Finds Flaw Revealing Up To 100,000 Social Security Numbers [Vulnerabiliy Publisher's Site, Feb 23 2005]
-Think Reveals Flaws in U.S. Government Security [Think Computers, Jan 13 2006]
-NetScape.com - JavaScript Exploit Embaressment [Threadwatch.org, Jul 26 2006]
-Erdogan supporters hack hacker's Web site [Turkish Daily News, May 9 2008]
-Hacker attacks the Ministry for Housing website as Spanish mortgages come under the international spotlight [Typically Spanish, Aug 30 2007]
-Video Recording of the Attack [Hacker, Jun 27 2007]
-Hacker may have stolen Duke students' data [UPI, Dec 5 2007]
-Hacker defaces Dallas police Web site [United Press, Feb 19 2008]
-Microsoft admits MSN site hacked in South Korea [USA Today, Jun 2 2005]
-Court indictment document, Oct 7 2008
- [Vandal Identity Resource Center, ]
-UC David Vet School Web Site [UC Davis, Jun 28 2007]
-U.Va. Faculty Names, SSN Security Breach [Univ. of Va., Jun 8 2007]
-Microsoft fixes Hotmail hack [VUnet, Jun 9 2005]
-LexisNexis Data Breach Bigger Than Estimated [Washington Post, Apr 13 2008]
-Paris Hilton Hack Started With Old-Fashioned Con [Washington Post, May 19 2005]
-Glitch on Verizon Wireless Web Site Left Data at Risk [Washington Post, Aug 12 2005]
-Arrests Made in '05 LexisNexis Data Breach [Washington Post, Jun 30 2006]
-XSS vulnerabilities in Google.com [Watchfire, Dec 21 2005]
-Alert - Yahoo! Webmail XSS [Cesar Cerrudo, Argeniss, Apr 17 2006]
-CardSystems was a Web Application Hack [Cesar Cerrudo, Argeniss, Apr 18 2006]
-SEC Vs. The Estonian Spiders [Web Pro News, Nov 2 2005]
-Malicious Website: Super Bowl XLI / Dolphin Stadium [WebSense, Feb 2 2007]
-Malicious Website / Malicious Code: MSNBC's Turkish site compromise [WebSense, Nov 7 2007]
-Patient Data Incident [, Mar 5 2007]
-Known Hole Aided T-Mobile Breach [Wired.com, Feb 28 2005]
-A Hacker Games the Hotel [Wired, Jul 30 2005]
-No Charges Filed Yet Against South Charlotte Computer Hacker [WSOC-TV, Jul 26 2005]
-Hacker breaks into Buffalo sports site [NBC, Mar 15 2006]
-Competition: As it was broken up ri.gov or as become the owner of the island [, ]
-Client Side Web Server Hacking [WHID Blog, Jan 28 2008]
-Xoops web site hacked [Vendor Web Site, Oct 28 2005]
-Santa brought to Zone-H a brand new defacement [Zone-H, Dec 22 2006]
-Microsoft.com defaced [zone-H, May 3 2007]
-Microsoft Defaced, again! [Zone-H, Jun 27 2007]
-Brazilian defacers hack hundreds of Stanford University web sites [Zone-H, Aug 21 2005]
-MS UK Zone-H defacements archive [Zone-H, Jul 6 2005]
-Mac sites are being hacked by blackhat XSS hackers [XSSworm, Nov 23 2007]
-U.K's Crime Reduction Portal Hosting Phishing Pages [Dancho Danchev, Jun 2 2008]
-Air Cargo Customs (Mumbai),
-Anthropological Survey of India.
-Aprox successfully attacks organizations that should really know better.
-A worm is now considered an Attack_Method rather than an outcome. If nothing else, the outcome of a worm is ""planting of malware"": itself.
-Bharat Sanchar Nigam Limited,
-Department of Administrative Reforms and Public Grievances,
-Department of Information Technology and
-Did the investigation go back to check that no one hacked the system prior to the published incident, potentially abusing it and avoiding publication?
-Forward markets Commission,
-I have added a ""Web 2.0"" organization type as many of the XSS worms infect Web 2.0 sites.
-Like every war, this one is not one sided. Interestingly enough, since this is a war between a country and a Guerrilla organization, and the cyber war which focus on mostly on conquering the minds of people is shaped similarly. The Israeli cyber war activity is mostly funneled through legal channels rather than hacking, as described by Wired.
-Lastly 4chan developed sophisticated robots to auto-vote. Those robots overcome Time's anti-automation protections: since each user is allowed to vote just once in every 13 seconds, the robots uses open proxies to vote faster. Since time only prevents voting for the same person from the same IP, the robots used the extra 12 seconds available for each source IP to vote down competitors. The system also reports to a central server allowing monitoring of the voting rate!
-Ministry of Railways,
-National Institute of Health and Family Welfare,
-National Institute of Social Defence,
-Access to management sections of the site and other users data.
-Password displayed in clear text and sent in the request line.
-Remember me is on by default on any login.
-Telecom Regulatory Authority of India,
-The researchers found that they can use Google to retrieve the hashed password of the hacker. Google has become so big that it actually allows efficient encrypted passwords lookup.
-The Time voting mechanism did not even check that the ranking in the vote was legal, so a link to vote down ""moot"" competitors in the list was also used until Time fixed the issue. Voting down is key to winning such a poll as 4chan competitors are not at rest running their own sophisticated campaigns.
-Using a typical CSRF counter measure, Time added a salted and hashed key to ensure that the poll was submitted from its own poll form. However the key was authentication on the client by Time's poll Flash application enabling 4chan to easily find it out and overcome the issue.
-Was no data vulnerable or just ""sensitive data"" and if so what is the data that was exposed?
-Was the data secured well, or were the hackers who tried to access it just not capable?
-While most known cases of Asprox attacks result in planting of malware on the web site, since this is easily detected by malware search services, the very brutal injection used by Asprox probably takes down more sites than it infects with malware.
-Wireless Planning & Coordination Wing,
-Zero day exploit in the wild - the attacker penetrated twice, once using a known SQL injection vulnerability, but the second time using a yet unknown vulnerability in WordPress, which was reverse engineered and published for the first time by the people at Light Blue Touchpaper.
-<!--break-->
-Mail & Guardian editor Nic Dawes said on Twitter that the website is ???under sustained attack by hackers??? and that it was taken offline to protect the security of their users. According to Dawes the attacks originate in Russia.",http://mybroadband.co.za/news/security/17999-Mail-Guardian-website-taken-down-after-hacker-attack.html,1/26/2011,Unknown,Unknown,Downtime,News,South Africa,No,,,Russia,,,,,
-Mail & Guardian editor Nic Dawes said on Twitter that the website is ???under sustained attack by hackers??? and that it was taken offline to protect the security of their users. According to Dawes the attacks originate in Russia.",http://mybroadband.co.za/news/security/17999-Mail-Guardian-website-taken-down-after-hacker-attack.html,1/26/2011,Unknown,Unknown,Downtime,News,South Africa,No,,,Russia,,,,,
-Malaysiakini, together with Sarawak Report, another site critical of the Sarawakian government under long-serving Chief Minister Taib Mahmud, have been under relentless denial-of-service (DDOS) attacks which temporarily brought them down in last few days",http://www.temasekreview.com/2011/04/15/malaysiakini-under-ddos-attack-ahead-of-sarawak-election-tomorrow/,4/15/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,Malaysia,No,,,,,,,,
-Malaysiakini, together with Sarawak Report, another site critical of the Sarawakian government under long-serving Chief Minister Taib Mahmud, have been under relentless denial-of-service (DDOS) attacks which temporarily brought them down in last few days",http://www.temasekreview.com/2011/04/15/malaysiakini-under-ddos-attack-ahead-of-sarawak-election-tomorrow/,4/15/2011,Denial of Service,Insufficient Anti-automation,Downtime,Government,Malaysia,No,,,,,,,,
-Malicious adverts were then released which caused fake virus warnings to pop-up on computers belonging to those surfing the affected sites.",http://www.dailymail.co.uk/sciencetech/article-1362205/Thousands-home-computers-infiltrated-hackers-infect-high-profile-websites-booby-trapped-ads.html,3/3/2011,Malvertising,Improper Output Handling,Planting of Malware,Finance,,Yes,,,,,,,,
-Malicious adverts were then released which caused fake virus warnings to pop-up on computers belonging to those surfing the affected sites.",http://www.dailymail.co.uk/sciencetech/article-1362205/Thousands-home-computers-infiltrated-hackers-infect-high-profile-websites-booby-trapped-ads.html,3/3/2011,Malvertising,Improper Output Handling,Planting of Malware,Finance,,Yes,,,,,,,,
-Malware distribution through ad programs is a borderline phenomenon. While there is no question that malware distribucion is malicious, and in most geographies illegal, in many cases the site owners are not technically responsible for the content of the ads they serve as the ad content comes directly from a 3rd party. The question whether they are legally responsible is open.
-Manager Bill Reinhardt said the district is still investigating how the thieves gained access to its accounts, and that it had notified the FBI about the breach. Reinhardt said the district has so far worked with its bank to reverse about half of the fraudulent transfers.",http://www.krebsonsecurity.com/2010/03/organized-crooks-hit-nj-town-arizona-utility/#more-1918,3/4/2010,Stolen Credentials,Insufficient Authentication,Monetary Loss,Finance,"Arkansas, USA",No,,,,,,,,
-Manager Bill Reinhardt said the district is still investigating how the thieves gained access to its accounts, and that it had notified the FBI about the breach. Reinhardt said the district has so far worked with its bank to reverse about half of the fraudulent transfers.",http://www.krebsonsecurity.com/2010/03/organized-crooks-hit-nj-town-arizona-utility/#more-1918,3/4/2010,Stolen Credentials,Insufficient Authentication,Monetary Loss,Finance,"Arkansas, USA",No,,,,,,,,
-Mar-00,WHID 2000-3: Gaffe at Amazon leaves email addresses exposed,"E-mail addresses of other customers displayed by mistake, no hacking was required",http://news.com.com/2100-1017-245387.html?legacy=cnet,9/6/2000,Abuse of Functionality,Application Misconfiguration,Leakage of Information,Retail,USA,No,,,,,,,,
-Mar-01,WHID 2001-3: Persistent XSS in Hotmail,Persistent XSS HTML Injection inside an HTML email message to hotmail,http://www.usatoday.com/tech/news/2001-08-31-hotmail-security.htm,8/31/2001,Cross Site Scripting (XSS),Improper Output Handling,Disclosure Only,Service Providers,,No,,,,,,,,
-Mar-02,WHID 2002-3: Reuters accused of hacking,"A company put its earnings report on site before its official release, but did not linked to it. Reuters found the document and published it.
-Mar-03,WHID 2003-3: User passwords could be stolid in Microsoft's Passport service,"
Additional information:
-Mar-04,WHID 2004-3: More Scary Tales Involving Big Holes In Web-Site Security - Iomega,"Additional information:
-Mar-05,WHID 2005-3: Misconfiguration issues in paid wireless access and billing applications,"Multiple misconfiguration problems such as browsable directories, physical path revealing and default or weak passwords
-Mar-06,WHID 2006-3: Russian hackers broke into a RI GOV website,"
Russian hackers broke into a Rhode Island government Web site and allegedly stole credit card data from individuals who have done business online with state agencies. The hackers claimed to have stolen 53,000 credit card numbers, while the hosting service provider claims the number was just 4113.
The technical reference site is in Russian, you can use Applied Languages Solutions for an online translations.
-Mar-07,WHID 2007-03: UI put staff data on Web,"
Personal information for about 2,700 University of Idaho employees was inadvertently posted at the school's Web site for 19 days in February, though officials say it was not easy to access and there's no reason yet to believe it was misused.
-Mar-09,WHID 2009-3: Google Trends Falls Victim to a Stunt,"
Someone, and not for the 1st time, succeeded in manipulating Google Trends, a Google service listing popular search terms. In this case the New York Time reports that a symbol at presumably denoting 9/11 reached number 2 in the list of hot Trends (see picture right).
-Mar-10,WHID 2010-3: Feds Crack Hackers' Stock Manipulation Cybercrime,"Hackers, working for BroCo Investments (a one-trader operation based in St. Petersburg, Russia) used stolen online brokerage credentials to initiate a pump-and-dump scheme. Within minutes of making the unauthorized transactions, the SEC claims BroCo then sold shares of these same stocks held in its own account at the artificially inflated prices, netting the hackers more than $250,000 in profits.
-Mar-11,WHID 2011-3: Hacked Military and Government Sites Just Scratch the Surface,"The Web has been abuzz with the revelation that hacked government and military Web sites, as well as databases of personal information are available for less than $500. As concerning as that may be, what should keep IT admins awake at night is the broader realization that these are only the hacked sites that were discovered on the hacker underground. There are more, and your site could be one of them.",http://www.pcworld.com/businesscenter/article/217472/hacked_military_and_government_sites_just_scratch_the_surface.html,1/21/2011,SQL Injection,Improper Input Handling,Leakage of Information,Government,,Yes,,44,,,,,,
-Mar-12,WHID 2012-3: Pastebin on the mend after DDoS battering,Popular text file sharing service Pastebin.com has returned online following a denial of service attack on Tuesday.,http://www.theregister.co.uk/2012/01/04/pastebin_ddos_recovery/,1/3/2012,Denial of Service,Insufficient Anti-automation,Downtime,Information,"Los Angeles, CA",Unknown,N/A,1,Unknown,File Sharing,,,,
-""Marisco said that a few days before the theft, she opened an e-mail informing her that a UPS package she had been sent was lost, and urging her to open the attached invoice,"" Krebs writes. ""Nothing happened when she opened the attached file, so she forwarded it on to her assistant who also tried to view it. The invoice was in fact a Trojan horse program that let the thieves break in and set up shop and plant a password-stealing virus on Marisco???s computer, and on the PC belonging to her assistant -- the second person needed to approve transfers.""",http://www.esecurityplanet.com/headlines/article.php/3890291/article.htm,6/29/2010,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,California,No,,,,,,,,
-""Marisco said that a few days before the theft, she opened an e-mail informing her that a UPS package she had been sent was lost, and urging her to open the attached invoice,"" Krebs writes. ""Nothing happened when she opened the attached file, so she forwarded it on to her assistant who also tried to view it. The invoice was in fact a Trojan horse program that let the thieves break in and set up shop and plant a password-stealing virus on Marisco???s computer, and on the PC belonging to her assistant -- the second person needed to approve transfers.""",http://www.esecurityplanet.com/headlines/article.php/3890291/article.htm,6/29/2010,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,California,No,,,,,,,,
-Matt Drudge denied that his site was infecting visitors, however it's likely that the malware is coming from ads delivered by a third-party ad network and not the site itself.",http://news.cnet.com/8301-27080_3-10466044-245.html,3/9/2010,Malvertising,Improper Output Handling,Planting of Malware,Media,USA,No,,,,,,,,
-Matt Drudge denied that his site was infecting visitors, however it's likely that the malware is coming from ads delivered by a third-party ad network and not the site itself.",http://news.cnet.com/8301-27080_3-10466044-245.html,3/9/2010,Malvertising,Improper Output Handling,Planting of Malware,Media,USA,No,,,,,,,,
-May-00,WHID 2000-5: Eve.com exposes customers order information,View other customers orders by changing a sequential number within a URL parameter,http://news.com.com/2100-1017-245700.html?legacy=cnet,9/13/2000,Credential/Session Prediction,Insufficient Authorization,Leakage of Information,Retail,,No,,,,,,,,
-May-01,WHID 2001-5: Privacy hole found in Verizon Wireless Web site,The privacy hole affected users who logged on to the Verizon Wireless Web site and used the My Account feature to view or change their cell phone billing and account information. The Web site address for the feature assigns session identifications sequentially as each user logs in which allows for forceful browsing.,"http://www.computerworld.com/securitytopics/security/privacy/story/0,10801,63587,00.html",9/6/2001,Credential/Session Prediction,Insufficient Authorization,Disclosure Only,Service Providers,,No,,,,,,,,
-May-03,WHID 2003-5: Car shoppers' credit details exposed in bulk,"User submitted information was being stored in a publicly available location. The URL found in the source code of a publicly available web page.
-May-04,WHID 2004-5: More Scary Tales Involving Big Holes In Web-Site Security - Gateway,"
Additional information:
-May-05,WHID 2005-5: Paris Hilton's T-Mobile online account hacked,"Details remain sketchy, but news reports include social engineering, a guessable secret question for password recovery, and a known vulnerability is BEA WebLogic
-May-06,WHID 2006-5: Hotmail XSS (1),"
Hotmail's filtering engine insufficiently filters JavaScript scripts. It is possible to write JavaScript in the BGCOLOR attribute of the BODY tag, using CSS. This leads to execution when the email is viewed. JavaScript must be Unicode encoded in order to fool the filter. This encoding is recognized with IE >= 6
-May-07,WHID 2007-05: Hacking John McCain,"
An open source developer virtually defaced John McCain's MySpace page. He did not have to commit any crime, because the page pulled an image directly from the open source developer's site.
-May-08,WHID 2008-05: Drive-by Pharming in the Wild,"
Symantec reported an active exploit of CSRF against residential ADSL routers in Mexico (WHID 2008-05). An e-mail with a malicious IMG tag was sent to victims. By accessing the image in the mail, the user initiated a router command to changethe DNS entry of a leading Mexican bank, making any subsequent access by a user to the bank go through the attacker's server.
-May-09,"WHID 2009-5: School data hacked, grades altered","This story about student hacking a Pottsville, PA school online system and changing grades demonstrated again that password stealing is by far the most common method in which web sites are hacked.
-May-10,WHID 2010-5: City of Albertville's web site hacked,"The website of the Mayor of Albertsville, AL was defaced with profanity.",http://www.waff.com/Global/story.asp?S=12166330,3/18/2010,Unknown,Improper Output Handling,Defacement,Politics,"Alabama, USA",No,,,"Alabama, USA",,,,,
-May-11,WHID 2011-5: Dominos Pizza Hacked,Domimos Pizza's online ordering system in India was hacked.,http://www.slipperybrick.com/2011/01/dominos-pizza-website-hacked-customer-data-leaked/,1/23/2011,SQL Injection,Improper Input Handling,Leakage of Information,Retail,India,No,,,,,,,,
-May-12,WHID 2012-5: Mass SQL Injection Storm Uses Search Engines And Automation,Security researchers monitoring mass SQL injection attacks warned the latest one may be nearing a million infected pages using a combination of automated tools with reconnaissance information gathered from search engines. This follows similar storms last year.,http://www.techweekeurope.co.uk/news/mass-sql-injection-storm-uses-search-engines-and-automation-to-infect-sites-53567,1/11/2012,SQL Injection,Improper Input Handling,Planting of Malware,Multiple,Multiple locations,No,N/A,Multiple,,,,,,
-McAfee took issue with Perforce???s implementation of access controls. For instance, using the Web interface, someone who manages to access one user account could access those of other users by manipulating the associated URL, or Web address, it said. Perforce responded that, if customers choose the systems most restrictive mode, that situation isn???t possible.",http://bits.blogs.nytimes.com/2010/03/05/flawed-security-exposes-vital-software-to-hackers/,3/5/2010,Predictable Resource Location,Insufficient Authentication,Leakage of Information,Technology,,No,,,,,,,,http://graphics8.nytimes.com/packages/pdf/technology/20100306Aurora.pdf
-McAfee took issue with Perforce???s implementation of access controls. For instance, using the Web interface, someone who manages to access one user account could access those of other users by manipulating the associated URL, or Web address, it said. Perforce responded that, if customers choose the systems most restrictive mode, that situation isn???t possible.",http://bits.blogs.nytimes.com/2010/03/05/flawed-security-exposes-vital-software-to-hackers/,3/5/2010,Predictable Resource Location,Insufficient Authentication,Leakage of Information,Technology,,No,,,,,,,,http://graphics8.nytimes.com/packages/pdf/technology/20100306Aurora.pdf
-Members of 4chan online forum that promotes users remaining anonymous organized distributed denial-of-service (DDoS) attacks on websites for the Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA), according to the security firm PandaLabs.
-Mike Paul said he is investigating the matter seriously and will pursue prosecution if the site he is promoting on Kwame Kilpatrick???s behalf indeed has been tampered with by outsiders.",http://www.freep.com/article/20100505/NEWS01/100505073/1322/Kilpatricks-site-down-spokesman-suspects-hackers,5/5/2010,Unknown,Unknown,Downtime,Government,USA,No,,,,,,,,
-Mike Paul said he is investigating the matter seriously and will pursue prosecution if the site he is promoting on Kwame Kilpatrick???s behalf indeed has been tampered with by outsiders.",http://www.freep.com/article/20100505/NEWS01/100505073/1322/Kilpatricks-site-down-spokesman-suspects-hackers,5/5/2010,Unknown,Unknown,Downtime,Government,USA,No,,,,,,,,
-Monday, the company's website, www.ddir.com, listed three geographic areas where the restaurant could be built.
-Most of the sites were fixed around 16 hours later, said officials, who in some cases had first been notified of the cyber attack by bdnews24.com's online report.
-Netcraft identified the issue by observing irregular activity by its toolbar users and Yahoo! fixed the vulnerability short after, on Oct 28th.",http://news.netcraft.com/archives/2008/10/26/ongoing_phishing_attack_exposes_yahoo_accounts.html,10/26/2008,Cross Site Scripting (XSS),Improper Output Handling,Session Hijacking,Internet,USA,No,,,USA,,,,,
-Netcraft identified the issue by observing irregular activity by its toolbar users and Yahoo! fixed the vulnerability short after, on Oct 28th.",http://news.netcraft.com/archives/2008/10/26/ongoing_phishing_attack_exposes_yahoo_accounts.html,10/26/2008,Cross Site Scripting (XSS),Improper Output Handling,Session Hijacking,Internet,USA,No,,,USA,,,,,
-Nov-04,WHID 2004-11: Phishers Manipulate SunTrust Site to Steal Data,"Phishing based on XSS
-Nov-05,WHID 2005-11: Samy XSS Worm Hits MySpace,"
The Samy worm at my space is now a classic, both a sophisticated attack and a well documented one, it became a case study in the web application security field. Recently Robert Hansen (RSnake) wrote a very interesting blog entry about Samy and what happened to him since.
-Nov-06,WHID 2006-11: Teenager claims to find code flaw in Gmail,"A 14 years old claims to have discovered an XSS flaw in Google's Gmail. Comments have been mixed, and Google did not comment, so either the flaw was fixed pretty fast, or did not exits.
-Nov-07,WHID 2007-11: Nokia defaced by XSS,"
Nokia's Canadian Web Site was defaced using an XSS attack.
-Nov-08,WHID 2008-11: Hacker breaks into Ecuador's presidential website,"Was it defaced or not? In this extraordinary incident, a hacker broke to the web site of the Ecuadorian president and said nice things about him. So nice in fact that the presidential office had to apologize in front of the opposition leader. Was it a hack or an over enthusiastic marketing person?
-Nov-09,WHID 2009-11: Lil Kim Facebook Hacked,"
I am not sure why rappers web presence is so often hacked. They might be the first generation of artists to use the web, brightly combining great Internet skills with technophobia which leads to basic operational errors. Or it might be the underground nature of the artists that (mis)manage their web presence by themselves.
-Nov-10,WHID 2010-11: U.S. Military Equipment Website Hacked,"A Lebanese hacker is taking credit for a security breach on the PEO Soldier Army website. By exploiting an SQL injection vulnerability, he allegedly obtained full access to the underlying database and the information contained within.",http://news.softpedia.com/news/U-S-Military-Equipment-Website-Hacked-131947.shtml,1/13/2010,SQL Injection,Improper Input Handling,Leakage of Information,Government,USA,No,,,Lebanon,,,,,
-Nov-11,"WHID 2011-11: Educational, government and military sites hit by hackers","A software security issue with a popular US-based web hosting provider is reportedly allowing hackers to secretly add dozens of web pages to military, educational, financial and government sites in a bid to promote so-called pharma retailing sites.",http://www.infosecurity-magazine.com/view/15209/educational-government-and-military-sites-hit-by-hackers/,1/17/2011,Known Vulnerability,Application Misconfiguration,Link Spam,Hosting Providers,Utah,No,,,,cPanel,,,,
-Nov-12,WHID 2012-11: Mercier Bridge website hacked,With construction work shutting down the inbound lanes of the Mercier Bridge later today you may find yourself looking for information on the Mercier Bridge website.,http://www.cjad.com/CJADLocalNews/entry.aspx?BlogEntryID=10337095,1/19/2012,Unknown,Unknown,Defacement,Government,Canada,No,NA,1,Unknown,Unknown,Unknown,None,None,
-Oct-04,WHID 2004-10: SQL Injection and XSS on presidential campaign web sites,"On Sunday, security analyst Richard Smith did a quick check of the Bush and Kerry campaign sites and found several security problems on each, all of which are common on many other websites.",http://www.wired.com/techbiz/it/news/2004/06/64036,6/30/2004,SQL Injection,Improper Input Handling,Disclosure Only,Politics,,No,,,,,,,,
-Oct-05,WHID 2005-10: Indian SATs results leaking,"Additional information:
-Oct-06,WHID 2006-10: NUJP website defacement seen not related to political crisis,"A mass defacement of a Philippine hosting service was carried our using SQL injection. It accidentally also defaced the site of the National Union of Journalists of the Philippines, which led some to believe that it was a targeted political attack.
-Oct-07,"WHID 2007-10: Super Bowl Site Hacked with Trojan, Key logger","
Hackers penetrated the Dolphins stadium web site just days before the Super Bowl was held there and modified the home page to include a Trojan inflecting script.
-Oct-08,WHID 2008-10: Chinese hacker steals user information on 18 Million online shoppers at Auction.co.kr,"
Update (January 5th 2009)
-Oct-09,WHID 2009-10: MacRumorsLive feed hack,"It seems that if the worse thing that can happen to hackers is a real accident to Apple's CEO Steve Jobs. The number of hacks devoted to informing us about his fictitious accidents is just overwhelming. In this case AnantaSec reports a hack into Mac Rumors feed that was possible simply because a file with the administrator password was laying around accessible to anyone due to an administration error.
",,1/7/2009,Unintentional Information Disclosure,Application Misconfiguration,Disinformation,Media,USA,No,,,,,,,,
-Oct-10,"WHID 2010-10: FBI, police ID Boulder synagogue Web site hacker",Boulder police and the FBI announced Friday that they have identified the individual who hacked into the Web sites of two Boulder synagogues and the Boulder Rabbinic Council last week and defaced them with anti-Semitic messages.,http://www.dailycamera.com/ci_14150610?source=most_emailed#axzz0ieLUTxxC,1/2/2010,Unknown,Improper Output Handling,Defacement,Religious,"Boulder, CO",No,,,,,,,,
-Oct-11,WHID 2011-10: US Hospital Server Hacked by ???Call of Duty: Black Op???s??? Fans,"Seacoast Radiology in Rochester, New Hampshire, announced last week it had informed over 231,000 patients that their details were accessed after their server was hacked back in November.
-Oct-12,WHID 2012-10: Rancho Mirage city website hacked,"A hacker or hackers took over the front page of the city website, leaving a message that could be seen Tuesday supporting the Occupy movement and denouncing the proposed Stop Online Piracy Act.",http://www.mydesert.com/article/20120117/NEWS01/120117002/Rancho-Mirage-city-website-hacked,1/17/2012,Unknown,Unknown,Defacement,Government,California,Unknown,NA,1,Unknown,Unknown,Unknown,Unknown,,
-Officials say $200,000 still hasn't been recovered.
-On April 12th, more than 250 sites were impacted when cyber terrorists attacked a server hosting sites including www.ArmeniaChat.com, www.ArmeniaSearch.com according to the owner of the sites (who wishes to remain anonymous), ANCA Communications Director Elizabeth Chouljian told PanARMENIAN.Net
-""Once the databases had recovered and the root cause had been fixed, we slowly allowed more people back onto the site,"" Johnson said. He added that ""for now we've turned off the system that attempts to correct configuration values.""",http://www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2010/09/27/urnidgns002570F3005978D8002577A9007EE871.DTL,9/27/2010,Misconfiguration,Application Misconfiguration,Downtime,Web 2.0,USA,No,,,,Facebook,,,,
-""Once the databases had recovered and the root cause had been fixed, we slowly allowed more people back onto the site,"" Johnson said. He added that ""for now we've turned off the system that attempts to correct configuration values.""",http://www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2010/09/27/urnidgns002570F3005978D8002577A9007EE871.DTL,9/27/2010,Misconfiguration,Application Misconfiguration,Downtime,Web 2.0,USA,No,,,,Facebook,,,,
-Once the hole was uncovered, he said, the group was able to write a script that would automatically predict ID numbers and return the associated e-mail addresses.
-""One obvious problem is that spammers can easily scrape this data and add easily legitimate address to their lists, many of whom might not give their addresses to Facebook for a reason,"" Watilo writes. The issue sparked a lively discussion thread on Hacker News. Facebook changed its robot.txt file to prevent the search engine from indexing the relevant ""opt out of emails from Facebook"" page so that email address data can no longer be harvested by spammers or other miscreants.",http://www.theregister.co.uk/2010/06/04/facebook_email_indexing_snafu/,6/4/2010,Unintentional Information Disclosure,Insecure Indexing,Leakage of Information,Web 2.0,USA,No,,,,Facebook,,,,
-""One obvious problem is that spammers can easily scrape this data and add easily legitimate address to their lists, many of whom might not give their addresses to Facebook for a reason,"" Watilo writes. The issue sparked a lively discussion thread on Hacker News. Facebook changed its robot.txt file to prevent the search engine from indexing the relevant ""opt out of emails from Facebook"" page so that email address data can no longer be harvested by spammers or other miscreants.",http://www.theregister.co.uk/2010/06/04/facebook_email_indexing_snafu/,6/4/2010,Unintentional Information Disclosure,Insecure Indexing,Leakage of Information,Web 2.0,USA,No,,,,Facebook,,,,
-One of its features displayed any message posted on Twitter if it included the term ???#cashgordon???, no matter what else it said.
-One of the posts in that thread also suggests that the attack vector is a vulnerable version (2.11.3) of phpMyAdmin used by RackSpace Cloud. If this is true, hackers must have targeted an XSRF attack at one of RackSpace admins with mySql root permissions to gain access to the whole database (probably created one more admin user). At this point, RackSpace has upgraded their phpMyAdmin nodes. Hope, they also found any changes in the database done by those hackers.",http://blog.sucuri.net/2010/06/mass-attack-of-wordpress-blogs-on-rackspace.html,6/15/2010,Cross Site Request Forgery (CSRF),Insufficient Process Validation,Planting of Malware,Service Providers,USA,No,,,,,,,,http://blog.unmaskparasites.com/2010/06/14/attack-on-wordpress-blogs-on-rackspace/
-One of the posts in that thread also suggests that the attack vector is a vulnerable version (2.11.3) of phpMyAdmin used by RackSpace Cloud. If this is true, hackers must have targeted an XSRF attack at one of RackSpace admins with mySql root permissions to gain access to the whole database (probably created one more admin user). At this point, RackSpace has upgraded their phpMyAdmin nodes. Hope, they also found any changes in the database done by those hackers.",http://blog.sucuri.net/2010/06/mass-attack-of-wordpress-blogs-on-rackspace.html,6/15/2010,Cross Site Request Forgery (CSRF),Insufficient Process Validation,Planting of Malware,Service Providers,USA,No,,,,,,,,http://blog.unmaskparasites.com/2010/06/14/attack-on-wordpress-blogs-on-rackspace/
-One of those government web sites are from Colombia. And they are not a normal .gov site, they are about security and about cyber crimes.
-On July 2, the websites of Henaran.am press club (Henaran.am) and Armenia's Sambo Federation (sambo.am) were hacked to place Azerbaijan's flag and references to Azerbaijani media on them. Meanwhile, the websites' operation has already been resumed.
-On June 11, the server provider sent an email to the Web site's owners stating that a major distributed denial-of-service attack (DDoS) had been focused on their data center.",http://www.irrawaddy.org/article.php?art_id=18759,6/19/2010,Denial of Service,Insufficient Anti-automation,Downtime,News,Burma,No,,,Burma,,,,,
-On June 11, the server provider sent an email to the Web site's owners stating that a major distributed denial-of-service attack (DDoS) had been focused on their data center.",http://www.irrawaddy.org/article.php?art_id=18759,6/19/2010,Denial of Service,Insufficient Anti-automation,Downtime,News,Burma,No,,,Burma,,,,,
-On Saturday, AVG Technologies received more than 300,000 reports of the malicious Facebook app, said Roger Thompson, AVG's chief research officer. AVG came up with its tally by counting the number of reports from its LinkScanner software, a free browser add-on that detects potentially poisoned pages.
- On Saturday evening, Urpilainen???s page had been targeted with obscene messages and child pornography.
-On Seclists.org you can find a post by porkythepig about the potential vulnerability that exists on many sites, including military and government.
- On Sunday, the web pages of the party???s Parliamentary group chairman Eero Hein?_luoma were hacked, and on Saturday evening it was the turn of the party???s chairwoman Jutta Urpilainen.
-On Thursday, the Legislature's information technology officials shut down the website's bill status function, which allows users to follow legislation such as roll calls, committee votes, amendments and fiscal notes.
-Operation Payback, the DDoS campaign led by Anonymous against anti-piracy groups and entertainment industry associations is now over a week old.
-Other than the Apple sites, the news service says that at least 538 000 ???mom-and-pop??? websites have been victimized by the hack, in addition to 500 000 more that appear quite similar but lead to different domains.
-???Our servers are under attack, we feel,??? McGary said, stressing that the problem pertained only to transmitting totals to the public, not accurately counting the votes.",http://www.middletownjournal.com/news/election/website-hacked-election-officials-say-687529.html,5/5/2010,Denial of Service,Insufficient Anti-automation,Downtime,Government,USA,No,,,,,,,,
-???Our servers are under attack, we feel,??? McGary said, stressing that the problem pertained only to transmitting totals to the public, not accurately counting the votes.",http://www.middletownjournal.com/news/election/website-hacked-election-officials-say-687529.html,5/5/2010,Denial of Service,Insufficient Anti-automation,Downtime,Government,USA,No,,,,,,,,
-Overnight, at least one Internet power user figured out a way to search for Blippy members??? credit card numbers on Google. A fairly obvious search for ???from card??? this morning returned 127 results that included full credit card numbers.",http://venturebeat.com/2010/04/23/blippy-credit-card-citibank/,4/23/2010,Unintentional Information Disclosure,Insecure Indexing,Leakage of Information,Web 2.0,,No,,,,,,,,
-Overnight, at least one Internet power user figured out a way to search for Blippy members??? credit card numbers on Google. A fairly obvious search for ???from card??? this morning returned 127 results that included full credit card numbers.",http://venturebeat.com/2010/04/23/blippy-credit-card-citibank/,4/23/2010,Unintentional Information Disclosure,Insecure Indexing,Leakage of Information,Web 2.0,,No,,,,,,,,
-""Owner Michelle Marisco said her financial institution at the time -- Professional Business Bank of Pasadena, Calif. -- normally notified her by e-mail each time a new wire was sent out of the company???s escrow account,"" writes Krebs on Security's Brian Krebs. ""But the attackers apparently disabled that feature before initiating the fraudulent wires.""
-
-
-
A very detailed report of the incident by the hacker shed light on how such hacks are carried out, including what the hacker went after and his exploitation techniques . The hacker found the exploit on milw0rm, a well known exploit repository, showing that public disclosure of vulnerabilities has its price, especially when it precedes the release if the patch.
-A byproduct if this vector is that is that results are catastrophic for the site owners. While in a case of common defacement attacks restoring (or recreating) the homepage is all it required to get back to business, in this case the whole database is ruined. Considering the scope of the attack and that restoring the database, if it was ever backup, requires much more expertise, the overall damage of this attack is very high.
-According to CheckFree report to the authorities, it estimates that around 160,000 customers where expoesed to the attack, and informed 5 million potential victims who may have been among this group.
-A copy of the report in case the original disappears can be found here.
",,2/1/2009,Local File Inclusion (LFI),Improper Input Handling,Leakage of Information,Technology,,No,,,,,,Password,28000,
-A copy of the report in case the original disappears can be found here.
",,2/1/2009,Local File Inclusion (LFI),Improper Input Handling,Leakage of Information,Technology,,No,,,,,,Password,28000,
-Actually the problem is so dominant that a recent StopBadware report lists Ipower as by far the most Malware infected hosting company. Reports mention that the problem started as early as mid 2006.
-
Additional information:
-Additional information:
-Additional Information:
-Additional technical information can be found on XSSed.
",,4/18/2008,Cross Site Scripting (XSS),Improper Output Handling,Defacement,Government,USA,No,,,,,,,,
-Additional technical information can be found on XSSed.
",,4/18/2008,Cross Site Scripting (XSS),Improper Output Handling,Defacement,Government,USA,No,,,,,,,,
-Thechnical analysis of the planted malware was done by Trend Micro.
",,1/26/2009,Unknown,Unknown,Planting of Malware,Government,,No,,,,,,,,
-Thechnical analysis of the planted malware was done by Trend Micro.
",,1/26/2009,Unknown,Unknown,Planting of Malware,Government,,No,,,,,,,,
-TicketMaster on going combat with hackers line bypassing to buy event tickets to resell them for a high price is a very good example of the issue. In this specific example the hackers demonstrate that Captcha, a method of blocking automated programs by presenting a challenge supposedly difficult for a computer software, is not sufficient.
",,3/9/2008,Brute Force,Insufficient Anti-automation,Extortion,Retail,USA,No,,,,,,,,
-TicketMaster on going combat with hackers line bypassing to buy event tickets to resell them for a high price is a very good example of the issue. In this specific example the hackers demonstrate that Captcha, a method of blocking automated programs by presenting a challenge supposedly difficult for a computer software, is not sufficient.
",,3/9/2008,Brute Force,Insufficient Anti-automation,Extortion,Retail,USA,No,,,,,,,,
-
-Read more...
-A Korean e-commerce site was hacked and a staggering number of record, 18 million, where stolen. In the US this would be front news. We don't know if it was front news in Korea, but did not get to the international media.
-Among his findings is a table including 700,000 e-mails, which would be a gold mine for spammers.
-And don't take it lightly as a geeks site. Geeks.com is a $150M/year business.
-An interesting aspect of this incident is that while the vulnerability has been discovered and fix on December 19th, the fact that it was actually exploited was discovered only in March 2009. Many times companies report that a vulnerability was found on there site, but they are not aware of any exploit of the vulnerability. As this incident shows, even if the company is not aware, there is a chance that the vulnerability was exploited.
",,12/19/2008,Stolen Credentials,Insufficient Transport Layer Protection,Leakage of Information,Media,Sweden,No,,,,,,,,
-An interesting aspect of this incident is that while the vulnerability has been discovered and fix on December 19th, the fact that it was actually exploited was discovered only in March 2009. Many times companies report that a vulnerability was found on there site, but they are not aware of any exploit of the vulnerability. As this incident shows, even if the company is not aware, there is a chance that the vulnerability was exploited.
",,12/19/2008,Stolen Credentials,Insufficient Transport Layer Protection,Leakage of Information,Media,Sweden,No,,,,,,,,
-An interesting side story is that Oliver Friedrichs from Symantec was quoted in a Computer World article only a week earlier saying that presidential campaign web sites are ""clueless"" about security. Was this a prophecy of or the trigger for the hack?
-Another insight is that real time controls for protecting web applications are essential. You need a WAF. While the specific vulnerability exploited is unknown, Installing ModSecurity would have probably prevented the exploit.
",,1/30/2009,Known Vulnerability,Application Misconfiguration,Defacement,Education,UK,No,,,,Moodle,,,,
-Another insight is that real time controls for protecting web applications are essential. You need a WAF. While the specific vulnerability exploited is unknown, Installing ModSecurity would have probably prevented the exploit.
",,1/30/2009,Known Vulnerability,Application Misconfiguration,Defacement,Education,UK,No,,,,Moodle,,,,
-Apart from, or actually because of the fact that the victims are security experts, this story is noteworthy due to two additional twists in the plot:
-Are domain hacking a case of web hacking? should they be included in WHID? in this case it seems, according to the Wired report that the hack itself involved attacking the domains registrar's (Network Solutions) web interface.
-A researcher found and exploited a serious SQL injection vulnerability in US web site of Kasperski, an anti-virus software vendor, exposing the full customers database. Well, the full database actually as the list of tables exposed proves. Apparently, the vulnerability existed for some time and the researched informed Kasperski about it to no avail before making it public.
-As a security practitioner I often see SQL injection bots, and many times when I install ModSecurity, an open source application firewall but this bot is unique in the way it exploits web sites. It is easier to perform a wide scale attack by exploiting the least common denominator, which in the hacking world is the operating system. As a result most SQL bots tend to try to use SQL injection vectors that will enable issuing OS commands. A good example is a Cacti vulnerability: since it allows an OS command to be issued I often see bots looking for it in the wild. This attack is the first I have seen in which the actual attack vector is SQL based. The bot is modifying every record it has access to into a malicious code in the hope that it will be fetched and displayed by the application to its users.
-As many you know, the news section is one of the few database driven parts in many mostly static sites, as it allows the site owner to add news without requiring a web designer. Therefore it came as no surprise that the attack was identified by a public source as an SQL injection attack.
-As tiny as VAServ is, probably no more than 3 people, in today's virtual and flat world they could serve tens of thousands of low cost web sites, many of them now lost for ever. Behind each one of these web sites there is a story of someone who worked hard, whether on a hobby or a small business and is now left with nothing. A comment made on one of the blog entries about the incident reads:
-As usual in such cases there is a question of whether the attack was a criminal activity, violation of the license agreement of the information provider or plainly legal. In this regard it is interesting to note that the group arrested in the incident was also responsible for the hacking to Paris Hilton Vodafone account, which was clearly an unlawful act.
-
As usual, the marketing department response is amazing, mentioning that ""the problem with its site was due to a bug in a Web application and not related to an unpatched system"". Does that make it better?
-At the same time that e-mails spreading the rumor where distributed, hackers blocked access to web sites enabling the public to check for themselves the status of the nuclear power pland intensifying the panic.
",,1/5/2009,Denial of Service,Insufficient Anti-automation,Chaos,Government,Russia,No,,,,,,,,
-At the same time that e-mails spreading the rumor where distributed, hackers blocked access to web sites enabling the public to check for themselves the status of the nuclear power pland intensifying the panic.
",,1/5/2009,Denial of Service,Insufficient Anti-automation,Chaos,Government,Russia,No,,,,,,,,
-At this time the only abuse known is a fraudulent use of about a 100 reloadable cards, which are used by companies to pay their employees.
-A unique form of SQL injection, or even just a close sibling, remote SQL by design is a vulnerability in which the web application accepts SQL statements from the client in the normal course of operation. The SQL statement might be used in a hidden field, or generated on the fly by a client side script. In any case, it is extremely difficult to prevent alteration of the SQL statement by a user in such applications, making the applications highly vulnerable.
-A very detailed technical explanation of the vulnerability is included in a FireFox community discussions on whether the issue is a browser or a web site issue. As usual, the truth is somewhere in the middle. The FireFox team selected to correct the issue discovered in FireFox. Microsoft claimed that the issue exploited in IE, which is reported to be a CSS expression issue, is not feature and not a bug and the vulnerable web site should be fixed.
",https://bugzilla.mozilla.org/show_bug.cgi?id=481558,3/4/2009,Content Spoofing,Improper Output Handling,Monetary Loss,Retail,USA,No,,,,,,,,
-A very detailed technical explanation of the vulnerability is included in a FireFox community discussions on whether the issue is a browser or a web site issue. As usual, the truth is somewhere in the middle. The FireFox team selected to correct the issue discovered in FireFox. Microsoft claimed that the issue exploited in IE, which is reported to be a CSS expression issue, is not feature and not a bug and the vulnerable web site should be fixed.
",https://bugzilla.mozilla.org/show_bug.cgi?id=481558,3/4/2009,Content Spoofing,Improper Output Handling,Monetary Loss,Retail,USA,No,,,,,,,,
-A well placed button labeled ""don't click"" make people click on it actually sending a Twitter message. Sunlight labs have a very interesting report showing the rate of propagation of the worm.
-Beyond making a mockery of the claim that the guide was limited to federal agents only, it also seemed to be a marketing method as it limits the potential advertisers from checking who is in the guide. After getting in Alex contacted some of the advertisers to find out that none of them got any value from the guide. Alex did not join, and I wonder how much Alex's report lowered the Federal Suppliers Guide earning.
",,2/29/2008,Stolen Credentials,Insufficient Authentication,Monetary Loss,Marketing,USA,No,,,USA,,,,,
-Beyond making a mockery of the claim that the guide was limited to federal agents only, it also seemed to be a marketing method as it limits the potential advertisers from checking who is in the guide. After getting in Alex contacted some of the advertisers to find out that none of them got any value from the guide. Alex did not join, and I wonder how much Alex's report lowered the Federal Suppliers Guide earning.
",,2/29/2008,Stolen Credentials,Insufficient Authentication,Monetary Loss,Marketing,USA,No,,,USA,,,,,
-But since the publication of the incident a year ago the way in which the breach occurred remained a mystery.
-But this domino effect ruining so many small businesses had another even more devastating angle. Just days before the hack, someone posted on milw0rm a long list of yet unpatched vulnerabilities in Kloxo, a virtual machine management software. The list certainly looks comprehensive enough to enable anyone to penetrate a site using Kloxo, which VAServ where, leading VAServ and others to believe that LxLabs, the Bangalorian software company behind Kloxo is the culprit. Somebody claiming to be the hacker commented to the inquistir blog, claiming that weak password at VAServ where to blame for the hack, which Rus Foster from VAServ denied.
-By exploiting a CSRF bug in twitter (or maybe a feature?) site owners can get twitter profiles of their visitors. For Twitter this is a second this year and now the comprise 50% of the web incidents for 2009. Is this going to be the year of Web 2.0 security?
-Celebs are fast becoming a prime hacking target. Miley Cyrus already made her debut at WHID when her Twitter account was raided. But it seems that this was not her first cyber incident for her. As reported by Wired, late last year a hacker named Josh Holly published private photos of Ms. Cyrus stolen from her G-mail account.
-Chriss Shiflett provides a very good technical analysis of the worm.
",,2/12/2009,Worm,Insufficient Process Validation,Defacement,Web 2.0,US,No,,,,,,,,
-Chriss Shiflett provides a very good technical analysis of the worm.
",,2/12/2009,Worm,Insufficient Process Validation,Defacement,Web 2.0,US,No,,,,,,,,
-Cnet reports the worm spread on Feb 12th in two pulses. After the Twitter people closed the loophole the 1st time, somebody bypassed the patch to restart the worm spread out.
-Contents of that account, including two sample e-mails, an index of messages and Palin family photos, have been posted by the whistle blower site Wikileaks, which contends that they constitute evidence that Palin has improperly used her private e-mail to shield government business from public scrutiny, an issue that had already been raised by others.
-David Kernell, the 20-year-old Tennessee college student was indicted with the hack. The most interesting aspect of the identity of the hacker is that his father Mike Kernell is a longtime Democratic state representative from Memphis
-Update (Feb 13th 2009) - Kasperski hired David Litchfield, a well known database security expert, to analyze the incident. In their response, Ksaperski point that no sensitive data was actually compromised to the event. The report points that the hacker and others following his hints did try to access sensitive data but did not succeed. The carefully worded report does leave many questions open:
-Penney, which during Gonzalez' trial had asked the U.S. District Court for the District of Massachusetts to bar the government from disclosing its identity, was revealed in the documents to be the company that had been known throughout the trial as ""Company A.""
-First, hacked embassy sites are becoming a major issue which points to a much larger issue: cyber crime is endangering the Internet as we know it. While we come to rely on the web to provide us with all the information and services that we need, we do not have the tools to make it a safe place, and embassy web sites are a good example.
-Firstly, the entire discussion in the references is about the
Trojan payload, with no word about the vulnerability that led to the
defacement. Actually a reviewer on the SiteAdvisor report gives the
green mark to the web site after the Trojan is removed, without
requiring any information about the actual problem.
-First, the attack came at absolutely the wrong time, just when all eyes (and mouse clicks) where turned to the Olympic games in Beijing, the NDTV web site which carried real time information from the games was hacked, greatly extending the infection rate.
-Frankly, I don't envy the marketing department role. The company, any company for that matter, is spending too little on web application security, sites are taken down daily, and the marketing people are send to fend off the public. They must have a thick skin to survive in marketing.
",,2/11/2009,SQL Injection,Improper Input Handling,Leakage of Information,Technology,Finland,No,,,Romania,,,,,
-Frankly, I don't envy the marketing department role. The company, any company for that matter, is spending too little on web application security, sites are taken down daily, and the marketing people are send to fend off the public. They must have a thick skin to survive in marketing.
",,2/11/2009,SQL Injection,Improper Input Handling,Leakage of Information,Technology,Finland,No,,,Romania,,,,,
-Further information:
-Getting to this report took some effort and the only non blogshpere copy we found is on the Visa web site. If you know anything about this incident, please help us complete the information by leaving a comment on contacting us.
",http://usa.visa.com/download/merchants/20090212-usss_fbi_advisory.pdf,2/25/2009,SQL Injection,Improper Input Handling,Monetary Loss,Finance,USA,No,,,,,,,,
-Getting to this report took some effort and the only non blogshpere copy we found is on the Visa web site. If you know anything about this incident, please help us complete the information by leaving a comment on contacting us.
",http://usa.visa.com/download/merchants/20090212-usss_fbi_advisory.pdf,2/25/2009,SQL Injection,Improper Input Handling,Monetary Loss,Finance,USA,No,,,,,,,,
-Going forward we are going to add such incidents to WHID if there is a reason to believe that they are not friendly, even if the actual goal of the attack cannot be easily classified. The Facebook case at hand is a perfect example: while the details are not clear, the fact that Facebook filed a law suit implies that there is fire behind the smoke.
-However, if the site is also vulnerable to CSRF, the XSS exploit can include in addition to the payload also the original XSS inflicting code run under the attacked users credential, modifying his content and therefore hiting his own friends, which hit their own friends and so on.
-However new information from the trial of the identity theft ring leader Albert Gonzalez, reveals that in order to penetrate TJX data center from the captured end points, the hackers employed different techniques including password sniffing and SQL injection. The later justifies getting the TJX incident for the 1st time into WHID.
-However, phpBB is not entirely off the hook, as the phpBB team admits. The stolen files included only hashed passwords, however phpBB 2 hash was unsalted and the hackers successfully brute forced 28,000 passwords. While phpBB 3, which is used on the phpBB site uses better password hashing, the upgrade procedure did not upgrade existing users waiting for their 1st login to upgrade. Anyone who did not log-in to the web site since the upgrade still had weakly hashed password in the database.
-However the Minnesota Independent reveals that the information was exposed for anyone to view on the senator's web site since at least January 28th. Hardly an attack. At the time the site was suffering performance issues and in a debate about the cause somebody commented to an Independent about the an exposed database, which the Independent was fast to report on. Moreover, Wikileaks took the trouble to inform the people in the list that their information leaked, while it took the Senator team over a month to react.
",http://minnesotaindependent.com/28711/breaking-colemans-unsecured-donorbase-to-be-revealed-on-wikileaks,3/11/2009,Administration Error,Application Misconfiguration,Leakage of Information,Politics,USA,No,,,,,,,4700,
-However the Minnesota Independent reveals that the information was exposed for anyone to view on the senator's web site since at least January 28th. Hardly an attack. At the time the site was suffering performance issues and in a debate about the cause somebody commented to an Independent about the an exposed database, which the Independent was fast to report on. Moreover, Wikileaks took the trouble to inform the people in the list that their information leaked, while it took the Senator team over a month to react.
",http://minnesotaindependent.com/28711/breaking-colemans-unsecured-donorbase-to-be-revealed-on-wikileaks,3/11/2009,Administration Error,Application Misconfiguration,Leakage of Information,Politics,USA,No,,,,,,,4700,
-However this specific hack is ever more interesting. At one point 4chan where bored with just running moot for presidency, so they decided to use their sophisticated machine to do a more elaborate work. They decided to fix all first 21 nominees so that their initials would spell ""Marblecake Also the Game"". And as Paul Lamere's screenshot proves, they made it.
",http://www.theregister.co.uk/2009/04/17/time_top_100_hack/,4/15/2009,Cross Site Request Forgery (CSRF),Insufficient Process Validation,Link Spam,Media,USA,No,,,,,,,,
-However this specific hack is ever more interesting. At one point 4chan where bored with just running moot for presidency, so they decided to use their sophisticated machine to do a more elaborate work. They decided to fix all first 21 nominees so that their initials would spell ""Marblecake Also the Game"". And as Paul Lamere's screenshot proves, they made it.
",http://www.theregister.co.uk/2009/04/17/time_top_100_hack/,4/15/2009,Cross Site Request Forgery (CSRF),Insufficient Process Validation,Link Spam,Media,USA,No,,,,,,,,
-However, we believe that the resulting ""virtual"" defacement of the web site by redirecting users to a fraudulent web site is still a web hack, even if the DNS hijacking is not web related.
-PHP-Nuke is a popular Web content management system (CMS), based on PHP and a database such as MySQL, PostgreSQL, Sybase, or Adabas. Earlier versions were open source and free software protected by GNU Public License, but since then it has become commercial software. As it is still very popular in the Internet community, it is not surprising that it has become a target of blackhat attacks.
-
-I am sure that the guys at Light Blue Touchpaper have the expertise to protect their WordPress installation, but they don??t have the time. They made the compromise between ease of management of their web site and its security. Actually my personal blog might be just as vulnerable, since as I write this I am very much not paying attention to its security.
-I have used this occasion to sort out worms reporting in WHID.
-",,1/5/2009,Domain Hijacking,Application Misconfiguration,Defacement,Internet,USA,No,,,,,,,,
-",,1/5/2009,Domain Hijacking,Application Misconfiguration,Defacement,Internet,USA,No,,,,,,,,
-
-Mikeyy's worm is a good example of how CSRF and XSS can be combined to create a strong blended attack, in this case a propagating worm. A Web 2.0 community generated site such as twitter is often vulnerable to stored XSS . This often implies that a user can update his own profile with malicious code and as a result others who view his content get hit. Without any other vulnerability to complicate things, you are safe as long as your friends are trustworthy.
-But tiny giants have another weakness: it all falls on the shoulders of too few people. In the case of LxLabs, on KT Ligesh the CEO. Ligesh committed suicide just a day after the hack for which his company was blamed. While already a troubled person, one cannot escape the thought that the hacking incident was the last straw.
",http://www.inquisitr.com/25617/update-new-information-on-the-vaserv-hack-that-wiped-100k-sites/,6/10/2009,Various,Unknown,Data Loss,Service Providers,,No,,,,,,,,
-But tiny giants have another weakness: it all falls on the shoulders of too few people. In the case of LxLabs, on KT Ligesh the CEO. Ligesh committed suicide just a day after the hack for which his company was blamed. While already a troubled person, one cannot escape the thought that the hacking incident was the last straw.
",http://www.inquisitr.com/25617/update-new-information-on-the-vaserv-hack-that-wiped-100k-sites/,6/10/2009,Various,Unknown,Data Loss,Service Providers,,No,,,,,,,,
-I must tkae my hat off to Kasperski for this frank analysis, which is very uncommon to companies who were breached and can really help to highlight the importance of application security.
-In addition, the information was syndicated from a French news agency. While apparently the agency did not have anything to do with the hack, the did catch some fire over the incident as some experts suggested it should help its customers to protect their systems.
-In a nutshell, hackers defaced Soulja Boy's MySpace page and published his e-mail and YouTube passwords on the net. They demanded $2,500 to give him his web presence back. For an artist that grew our of the Internet this presence is naturally very important, however he is now important enough that his record label was able to contact the different sites to get him his web properties back without paying the money.
-In a related but yet unconfirmed story Holly claims to have used the MySpace administrative account for an advertising scam by which he gained $50,000.
",,10/20/2008,Administration Error,Application Misconfiguration,Leakage of Information,Web 2.0,,No,,,,,,,,
-In a related but yet unconfirmed story Holly claims to have used the MySpace administrative account for an advertising scam by which he gained $50,000.
",,10/20/2008,Administration Error,Application Misconfiguration,Leakage of Information,Web 2.0,,No,,,,,,,,
-Insufficient anti-automation is fast becoming a major, if not the major threat to web application. The reason is that it can be very profitable for the hacker, and on the other hand it is far from a simple vulnerability just requiring a quick fix.
-In this case I have decided to categorize the attacked entity as Soulja Boy and not MySpace or YouTube, as I used to do in the past. The fact that the attack was against Soulja Boy properties around the web makes him, rather than any technology platform, the attack target.
",,9/1/2008,Unknown,Insufficient Authentication,Extortion,Entertainment,,No,,,,,,,,
-In this case I have decided to categorize the attacked entity as Soulja Boy and not MySpace or YouTube, as I used to do in the past. The fact that the attack was against Soulja Boy properties around the web makes him, rather than any technology platform, the attack target.
",,9/1/2008,Unknown,Insufficient Authentication,Extortion,Entertainment,,No,,,,,,,,
-In this incident a group of people opened accounts at data broker LexisNexis and used automated tools to extract a large amount of personal information provided by the service.
-In this story, like most calamities, it seems that the laymen suffer: small entrepreneurs & upstart companies who lost everything in a hacking incident. One of them even lost his life.
-It all started on Sunday, June 7th: someone broke into the web servers of VAServ, a tiny UK based hosting company. The hackers ruined many of VAServ virtual servers. Some of them lost were for ever as the snippet from VAServ home page, serving as an emergency bulletin board, shows.
-It is important to note that this incident is not related to Twitter phishing attack which occurred on the previous weekend.
-It seems that the original report was not accurate and it was not a CSRF vulnerablity that was exploited. The mistake is reported by the victim in an imaginary discussion with Google blog post (Search the page for XSRF) and by Google. Google hints that it was a phishing attack, but David Airey is not convinced.
-Just think about tens of thousand of such stories. Daniel Voyce, a web developer using VAServ for all of his clients, told the Register:
-Please prepare to recommit your changes since that date.
-Lil Kim is joining Soulja Boy in being cyber abuse, or so she claims, saying that a blog entry calling Naturi Naughton, the actress who portrays her in a new film, “tasteless and talentless.”, is a fake.
",,1/26/2009,Unknown,Unknown,Disinformation,Entertainment,USA,No,,,,,,,,
-Lil Kim is joining Soulja Boy in being cyber abuse, or so she claims, saying that a blog entry calling Naturi Naughton, the actress who portrays her in a new film, “tasteless and talentless.”, is a fake.
",,1/26/2009,Unknown,Unknown,Disinformation,Entertainment,USA,No,,,,,,,,
-Luckily Giorgio Maone decided to create his own proof of concept, run it himself and provide us with the result, enabling me to label this as a hack
-Many times we dismiss seemingly minor vulnerabilities in major web sites. Most notably, ""yet another"" XSS or CSRF vulnerability in a well known service is not considered news anymore. However the following story proves that no matter what, such vulnerabilities cannot be ignored.
-More information:
-More Information:
-
",,1/7/2009,Cross Site Request Forgery (CSRF),Insufficient Process Validation,Leakage of Information,Web 2.0,USA,No,,,Italy,,,,,
-
",,1/7/2009,Cross Site Request Forgery (CSRF),Insufficient Process Validation,Leakage of Information,Web 2.0,USA,No,,,Italy,,,,,
-Police Commissioner A.K. Khan told reporters that seven people, among them five passport agents, were arrested and a search was on for two other agents involved in the racket.
-Police said Yu bought the ???Netbot Attacker??? program from a Chinese hacker last November, then sold copies online to Kim and others. The gang broke into the administrative systems of the PC rooms and installed the virus in their computers to allow them to see the hands of poker opponents.",http://joongangdaily.joins.com/article/view.asp?aid=2922391,6/28/2010,Malware,Abuse of Functionality,Monetary Loss,Entertainment,Korea,No,,,,,,,,
-Police said Yu bought the ???Netbot Attacker??? program from a Chinese hacker last November, then sold copies online to Kim and others. The gang broke into the administrative systems of the PC rooms and installed the virus in their computers to allow them to see the hands of poker opponents.",http://joongangdaily.joins.com/article/view.asp?aid=2922391,6/28/2010,Malware,Abuse of Functionality,Monetary Loss,Entertainment,Korea,No,,,,,,,,
-Police say someone was able to get a user name and password. Authorities say a virus or a fake Web page set up to mimic the bank's real one might have been used to carry out the thefts.",http://www.nj.com/news/index.ssf/2010/10/online_hackers_steal_600k_from.html,10/1/2010,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,"New Jersey, USA",No,,,,,,,,
-Police say someone was able to get a user name and password. Authorities say a virus or a fake Web page set up to mimic the bank's real one might have been used to carry out the thefts.",http://www.nj.com/news/index.ssf/2010/10/online_hackers_steal_600k_from.html,10/1/2010,Banking Trojan,Insufficient Authentication,Monetary Loss,Finance,"New Jersey, USA",No,,,,,,,,
-Politically motivated cyberattacks are becoming more commonplace and sophisticated, SecureWorks observes.",http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=228000335,10/19/2010,Denial of Service,Insufficient Anti-automation,Downtime,Politics,Vietnam,Yes,Vecebot Botnet,5,,,,,,
-Politically motivated cyberattacks are becoming more commonplace and sophisticated, SecureWorks observes.",http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=228000335,10/19/2010,Denial of Service,Insufficient Anti-automation,Downtime,Politics,Vietnam,Yes,Vecebot Botnet,5,,,,,,
-On the positive side, the report states that at the time of writing, there is a ceasefire and parties are negotiating. Is there room for cyber peace along side cyber war?
",,4/1/2008,Brute Force,Insufficient Anti-automation,Downtime,Multiple,,No,,,,,,,,
-On the positive side, the report states that at the time of writing, there is a ceasefire and parties are negotiating. Is there room for cyber peace along side cyber war?
",,4/1/2008,Brute Force,Insufficient Anti-automation,Downtime,Multiple,,No,,,,,,,,
-On the technical side, insufficient anti-automation controls have been one of the more obscure and hardest to fix vulnerabilities in web applications. Starting with the Lexis-Nexis incident (WHID 2005-65), many incidents where waved off as nothing more than an automated client. However, as the incidents pile it becomes clear that it is the responsibility of the site owner to mitigate such harmful automation attacks.
",,1/6/2009,Process Automation,Insufficient Anti-automation,Disinformation,Internet,USA,No,,,,,,,,
-On the technical side, insufficient anti-automation controls have been one of the more obscure and hardest to fix vulnerabilities in web applications. Starting with the Lexis-Nexis incident (WHID 2005-65), many incidents where waved off as nothing more than an automated client. However, as the incidents pile it becomes clear that it is the responsibility of the site owner to mitigate such harmful automation attacks.
",,1/6/2009,Process Automation,Insufficient Anti-automation,Disinformation,Internet,USA,No,,,,,,,,
-Popular Russian blogger and SUP expert Roustem Adagamov tweeted that LiveJournal is under DDoS attack right now.",http://www.panarmenian.net/eng/it_telecom/news/66359/LiveJournal_under_DDoS_attack_right_now,4/6/2011,Denial of Service,Insufficient Anti-automation,Downtime,Blogs,,No,,,,,,,,
-Popular Russian blogger and SUP expert Roustem Adagamov tweeted that LiveJournal is under DDoS attack right now.",http://www.panarmenian.net/eng/it_telecom/news/66359/LiveJournal_under_DDoS_attack_right_now,4/6/2011,Denial of Service,Insufficient Anti-automation,Downtime,Blogs,,No,,,,,,,,
-
-
-
",,1/15/2009,Insufficient Authentication,Insufficient Authentication,Disinformation,Education,USA,No,,,,,,,,
-
",,1/15/2009,Insufficient Authentication,Insufficient Authentication,Disinformation,Education,USA,No,,,,,,,,
-
",,2/3/2009,Insufficient Authentication,Insufficient Authentication,Leakage of Information,Entertainment,USA,No,,,,,,,,
-
",,2/3/2009,Insufficient Authentication,Insufficient Authentication,Leakage of Information,Entertainment,USA,No,,,,,,,,
-Additional information:
-Back in 2005 this data breach was one of the first such incidents, generated a lot of media interest, and led to more regulation regarding information aggregators. Interestingly, the excuse given by the company was that the incident was that there was no security failure in the web site, but that the procedures where lacking. We accepted this story at the time, but today we believe that such automation and scraping attacks are among the most dangerous attacks.
-
As usual in such cases the actual way in which the information was stolen was not disclosed. A federal trade commission report on the incident, published only in 2007, revealed that the incident was a result on an SQL injection attack on Guidance servers. In a settlement with the FTC, Guidance agreed to implement a comprehensive information security program, including independent, third-party audits every other year for the next ten years.
-
Like any DDoS attack, it is very hard to know if it was an application layer or network layer attack, but since this attack had a very significant financial impact by crippling a web site, we think it deserve a place in WHID.
-
The direct cost of the breach, informing customers, researching the incident and upgrading the protection of the web site cost the company tens of thousands of dollars.
-
The information included personal data such as social security numbers, birth dates, address, phone number, insurance numbers and in some cases the reason for the visit.
-
The interesting anecdote is that the person who discovered the issue has used a different, but also questionable technique of maintaining a very large number of portfolios automatically managed by automated programs using the fact that the game allowed a user to have any number of portfolios but only the best one is counted. Kosher, but stinks.
-
The site was taken off line for 10 hours to fix the issue. It is a significant incident, as it is one of those rare occasions where vulnerability was serious enough to force the organization to just take the site off line until it is fixed.
-
This is a very interesting example of the sensitivity of partial data or small pieces of information and not just the big secrets.
-
This story remind an older story about a predictable delay in a poker game that enabled gamblers to beat the house.
-
We somehow missed this story so it finds its way to WHID only now in late 2007.
-
While this might be classified as a business process design flaw, isn't security also about this?
-
Practically the only way to provide sufficient security to a web site is not to have it in the first place. Instead small organizations must rely on the services of huge brokers, such as Amazon, eBay or Google sites. However not everyone can use this services. Embassies are a good example as they need to be ""doubly localized"" for both the originating and target countries which makes it nearly impossible to create a uniform service for them. Therefore even embassies of larger countries need to create small home made and insecure web sites, as they need to adjust their site content, language and site look to the local community served.
-Probably yet another fallout from the on going Asprox attack, this incident is interesting as it emphasises the responsibility that customers expect service providers to take in protecting from web based attacks.
",,1/16/2009,SQL Injection,Improper Input Handling,Planting of Malware,Government,UK,No,,,,,,,,
-Probably yet another fallout from the on going Asprox attack, this incident is interesting as it emphasises the responsibility that customers expect service providers to take in protecting from web based attacks.
",,1/16/2009,SQL Injection,Improper Input Handling,Planting of Malware,Government,UK,No,,,,,,,,
-The root cause of the breach here is mentioned as being a vulnerability in either Apache, PHP or cPanel. I have selected the third as being more probably until further evidence materialize.
- The service redirected users to a different server and propagated the user information in a hidden field without re-authenticating.
-
Read the comments, they are enlightening. As usual, one of the problem when spam is involved is defining if and what is a wrong doing and what is a valid action. Some commenters say that Craigslist has become useless due to the spam, while others say that Craiglist is the worst censors on the Internet not letting small time businesses work. Other argue about whether this is a crime or not. 132 comments, and they keep coming 8 months after the article has been published.
",,5/22/2008,Brute Force,Insufficient Anti-automation,Link Spam,Information Services,,No,,,,,,,,
-Read the comments, they are enlightening. As usual, one of the problem when spam is involved is defining if and what is a wrong doing and what is a valid action. Some commenters say that Craigslist has become useless due to the spam, while others say that Craiglist is the worst censors on the Internet not letting small time businesses work. Other argue about whether this is a crime or not. 132 comments, and they keep coming 8 months after the article has been published.
",,5/22/2008,Brute Force,Insufficient Anti-automation,Link Spam,Information Services,,No,,,,,,,,
-Recently new articles about the case (listed below) revealed that SQL injection was used by the attackers to install malicious script on the CardSystems web application database which where scheduled to run every four days, extract records, zip them and export them to an FTP site.
-Reported by Alexandre Sieira
-Prosecutors charged Timothy Peter Noirjean, 26, of Woodbury, with 13 counts of identity theft, alleging that from February 2010 through March 2010 he contacted women online and duped them into providing him with personal information that allowed him to hack their Facebook and other accounts. After hacking a Facebook account, prosecutors say Noirjean would pose as the owner to make contact with that person's friends and try to gain access to more computer accounts.
-Prosecutors said the men hired a hacker in Bulgaria to program a way around the ""CAPTCHA"" technology that requires ticket buyers to read and retype two distorted random words to prove they are people, not a computer program. In a spectacular irony, the defendents managed to take a process meant to distinguish between a human and a machine - and automate it. The indictment said they even programmed their bots to make mistakes so they would appear to be human ticket buyers. When the bots swarmed a Web site, they were able to fill out the CAPTCHA fields in a twinkling, beating any real human buyers.
-Sage is the leading provider of accounting software in the UK and it was about to launch a trendy small business SaaS offering. However as ZDnet reports, serious security flaws were discovered in the public beta and the company has to call off the launch. Who discovered the issues? naturally the competition. Duane Jackson, the CEO of a tiny rival company reported them on his blog.
-Secondly, most trust systems, including SiteAdvisor,
completely fail to detect the breach. Which makes me think about those
trust models: they check that the site was not breached, while they
should check that the site is not vulnerable. I guess the reason is
that their primary goal is to detect intentionally malicious sites and
not breaches is normative sites, but others use them to assess the
level of security of the later.
-So what is Uno's mischeif this time? This time it is the International Herald Tribune Uno is after. The impact of this attack, if carried out by a malicious hacker might have been profound as it seems that Uno got access to user name and passwords of editors and contributors, posibily enabling a malicious hacker to publish information on their behalf on this very prestigious newspaper.
",,2/17/2009,SQL Injection,Improper Input Handling,Leakage of Information,Media,USA,No,,,Romania,,,,,
-So what is Uno's mischeif this time? This time it is the International Herald Tribune Uno is after. The impact of this attack, if carried out by a malicious hacker might have been profound as it seems that Uno got access to user name and passwords of editors and contributors, posibily enabling a malicious hacker to publish information on their behalf on this very prestigious newspaper.
",,2/17/2009,SQL Injection,Improper Input Handling,Leakage of Information,Media,USA,No,,,Romania,,,,,
-As for the technical details, the reports found that the following issues in the application:
-More than anything, the incident shows how difficult it is for developers to migrate from desktop software to a web based offering. This is a whole new ball game, and security is one of the more difficult issues to adjust to. On the other hand it also shows that on line services are much more exposed to scrutiny, which may result in better security down the line.
-Update (Oct 8)
-""Since last night, I've had probably 40 phone calls from clients saying 'Why is my website down, It's making me look bad.""
-""yeah thanks for ruining my life for the last 2 years i had built up my site spending alot of money and giving up my job for nothing.........what am i going to tell the wife?""
-
-Such poll are probably always distorted by automated programs, with every stakeholder running his own robot to promote a cause. The current time poll status Shawn above includes mostly known people, though the standings do seem skewed. Is it just that our view of the world is different than others, or have Muslims around the world become avid Time readers? The top rated person, ""moot"", which none of you heard about until now, proves that it is all about automation.
-Symantec response team found actively used alternative in the best known page on the internet: Google primary search page. By using the Google famous ""I feel lucky"" feature, the spammer can automatically lead the victim to the first result of a search. All the spammer is left with is finding a query for which his site would pop up first on Google.
-
-The actual damage to an organization of an attack is rarely disclosed, and coverage focuses on the Number_of_Records stolen. In the court documents Merrick reveals that its own damage from the CardSystems incident was $16,000,000! The money was paid to card holders to compensate for losses and for legal fees and fines.
-The Washington Post report about govtrip.com spreading malware is unique because this is an official US General Services Administration (GSA) web site and many US federal departments employees are required to reserve travel through it. In addition, the site is run by a major defense contractor, Northrop Grumman, who you would think would know better. How secure are their defense projects when it comes to application security?
",,2/11/2009,Insufficient Authentication,Insufficient Authentication,Planting of Malware,Retail,USA,No,,,,,,,,
-The Washington Post report about govtrip.com spreading malware is unique because this is an official US General Services Administration (GSA) web site and many US federal departments employees are required to reserve travel through it. In addition, the site is run by a major defense contractor, Northrop Grumman, who you would think would know better. How secure are their defense projects when it comes to application security?
",,2/11/2009,Insufficient Authentication,Insufficient Authentication,Planting of Malware,Retail,USA,No,,,,,,,,
-The incident also highlights the total breakup of cyber security. The incident is blamed on an unpatched version of Moodle, an open source on-line education software. The naive way ot thinking would be that schools don't have the budgets to protect their applications or even to upgrade them. However, as this incident shows, proper security is fundamental and a substantial part of the budget should be allocated to it, even it means we spend less on the application features. We need to move slower but ensure security. After all, what is the value of an educational system that shows porn?
-The attack description is vague but can be best described as session hijacking.
-The attack is simple, the result pretty frightening. An attacker, presumably Iranian, stole the domain name of David Airey, a graphic artist and a known blogger. The attack was very well timed with David's leaving to a long vacation. The goal was to extort money in order to return the domain. In David's case there is a happy end, as the attention he got helped him receive his blog back, with some loss in traffic, search engine ranking and time. But other victims of the attacker who steal domains for living may not be as fortunate.
-The Attack_Method is only described as an exploit of a security hole in the foundation's publishing software. However, the attack looks very much like a variation of the popular iframe injection SQL bots, used for malice rather than profit, hinting that this was an SQL injection attack.
-The breach caused severe migraines and near-seizure reactions in some site visitors who viewed the images. People with photosensitive epilepsy can get seizures when they're exposed to flickering images, a response also caused by some video games and cartoons.
-The case is also interesting as it put to test the liability of the certifying entity (in this case Savvis) resulting from assessing. The results may have profound influence on the PCI QSA market and therefore PCI itself. David Navetta posts an excellent legal analysis of the potential implications of the lawsuit.
-The change was done using correct credentials to login to the administrative web site of Network Solutions, CheckFree domain registrar. It is yet unknown how the hackers got the credentials. Since Phishing attacks against domain registrars including Network Solutions have started to surface recently, a good guess is that it was through a Phishing attack.
-The Coleman team called in the US Secret Service to investigate the leak in which sensitive information about more than 4700 donors was published on Wikileaks, a web site devoted to such exposures. Coleman himself called the incident ""an obviously an attack on my campaign"".
-The culprit was an LFI (Local File Inclusion) vulnerability in PHPlist, an application for managing newsletters which enables the hacker to grab phpBB users list. Another researcher claims that this is not an LFI but a super-globals-overwrite, which is still used to include files.
-The defaced site, as logged by the register was:
-The FTC settlement cost ValueClick a record amount of $2.9 million dollars, plus 20 years of rigorous security procedures that will probably cost as much if not more. On top of that, eBay, a major partner, left ValueClick as a result.
-
The hack seems to have paid of to Mikeyy Mooney who was hired to as security consultant following the incident.
-The hack was a relatively sophisticated one and a very good example of the risks of Web 2.0. Holly penetrated a MySpace administrator using social engineering. Using the account he gained access to a list of passwords which MySpace stored in an unencrypted form. Unbelievable. Since most of us use the same password for multiple services, Holly used Cyrus' MySpace password on her G-mail account gaining access and retrieving the photographs.
-The information stolen includes names, addresses, e-mail addresses, phone numbers, credit card account numbers and card expiration dates. The Number_of_Records stolen is unknown.
-The interesting part is that the site had a Hacker Safe seal. The seal was revoked twice last year due to vulnerabilities, but restored after they where patched. It seems that this time the hack preceded the scan or the scan missed the vulnerability. So much for application scanning and vulnerability assessment....
-The Register article is interesting due to another perspective: when discussing the future of Zone-H, John Leyden writes:
-The report is unique in describing an attack on financial services. Such attacks are know to happen but are seldom reported, certainly not with the amount of details in this report. However, the report does not indicate which incident it is based on. Is the close proximity of the report release to the Heartland incident just a coincidence?
-The scam exploits an XSS vulnerability in iRedirector, a software used to map sub-domains into paths on the site, in order to hijack domains and use them as Phishing targets. Since iRedirector enables virtually any sub domain to be defined, the attacker can now create an endless number of combinations of domain names built to fool users and web filters alike.
",,2/10/2009,DNS Hijacking,Improper Output Handling,Phishing,Multiple,Various,No,,,,iRedorector,,,,
-The scam exploits an XSS vulnerability in iRedirector, a software used to map sub-domains into paths on the site, in order to hijack domains and use them as Phishing targets. Since iRedirector enables virtually any sub domain to be defined, the attacker can now create an endless number of combinations of domain names built to fool users and web filters alike.
",,2/10/2009,DNS Hijacking,Improper Output Handling,Phishing,Multiple,Various,No,,,,iRedorector,,,,
-The scam is a good example of the dangers of Web 2.0 user generated content and mashups. There was no malicious code on the Obama's site, however an allowed HTML code looking like a YouTube embedded flick pointed to an external site which carried the malware.
",,1/27/2009,Content Spoofing,Improper Output Handling,Planting of Malware,Government,USA,No,,,,,,,,
-The scam is a good example of the dangers of Web 2.0 user generated content and mashups. There was no malicious code on the Obama's site, however an allowed HTML code looking like a YouTube embedded flick pointed to an external site which carried the malware.
",,1/27/2009,Content Spoofing,Improper Output Handling,Planting of Malware,Government,USA,No,,,,,,,,
-The sensitive information was stolen by manipulating predictable identifier parameters. The stolen information belong to at least 270 people and includes the name, address, age and other information could be used to obtain credit cards and open bank accounts.
-The site of the United Nations was broken into and defaced using a pretty basic SQL injection technique, and the referenced article has all the details
-The Telegraph response was published on their official blog.
",http://www.hackersblog.org/2009/03/06/telegraphcouk-hacked-sql-injection/,3/6/2009,SQL Injection,Improper Input Handling,Leakage of Information,Media,UK,No,,,Romania,,,,,
-The Telegraph response was published on their official blog.
",http://www.hackersblog.org/2009/03/06/telegraphcouk-hacked-sql-injection/,3/6/2009,SQL Injection,Improper Input Handling,Leakage of Information,Media,UK,No,,,Romania,,,,,
-The TJX breach is one of most publicized hacking incident in recent years. However, until now it was not part of the Web Hacking Incidents Database. And for a good reason: early report described the hack as a war driving hack, in which the attackers drive around and find a wireless network not properly secured.
-The US Federal Trade Commission charged ""life is good"" with lack of reasonable and appropriate security for the sensitive consumer information stored on its servers. The company's settlement with the company requires the company to accept a very comprehensive and costly security procedure going forward.
-This entry is a very important one. Most are already familiar with the infamous CardSystems incident where hackers stole 263,000 credit card numbers, exposed 40 million more and several million dollars fraudulent credit and debit card purchases had been made with these counterfeit cards. As a result of the breach CardSystems nearly went out of business and was eventually purchased by PayByTouch. CardSystems is considered by many the most severe publicized information security breach ever and it caused company share holders, financial institutes and card holders damage of millions of dollars.
-This incident highlights the issue of public facing administration interfaces, which often combine strong functionality with lesser attention to quality and therefore security. As organizations virtualize, those interfaces become available over the Internet, often without sufficient protection.
-This incident is a great example of the lack of sufficient international coverage at WHID. Help us by sending us non English incidents! After all, it is not English speakers only that get hacked, but rather us, the WHID maintainers that speak only this language.
-This incident is unique since PlusNet has published a very interesting and revealing report about the incident that shed a lot of light on real world state of life application security. A must read.
-This incident shows the importance of timely patching, but also brings back the age old debate around publication of vulnerabilities by researchers. Does it contribute to software security or just helps the hackers?
",,8/12/2008,Credential/Session Prediction,Insufficient Authorization,Defacement,Multiple,,No,,,,Joomla,,,,
-This incident shows the importance of timely patching, but also brings back the age old debate around publication of vulnerabilities by researchers. Does it contribute to software security or just helps the hackers?
",,8/12/2008,Credential/Session Prediction,Insufficient Authorization,Defacement,Multiple,,No,,,,Joomla,,,,
-This is another example of how fatal is SQL injection. SQL Injection is considered one of the more well understood attack vectors, easy to find during a security review, and therefore easy to get rid of. However one of its variants, blind SQL injection, can appear everywhere in the application and not just in key pages managing sensitive information and expose the entire database, making a review and fix of the application from it much harder.
",,2/7/2009,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,No,,,Romania,,,,,
-This is another example of how fatal is SQL injection. SQL Injection is considered one of the more well understood attack vectors, easy to find during a security review, and therefore easy to get rid of. However one of its variants, blind SQL injection, can appear everywhere in the application and not just in key pages managing sensitive information and expose the entire database, making a review and fix of the application from it much harder.
",,2/7/2009,SQL Injection,Improper Input Handling,Leakage of Information,Technology,,No,,,Romania,,,,,
-This is a wonderful example of a web application design flaw. There was nothing wrong with the code, however the design of the feature enabled it to be abused.
-This is one of the most stunning examples where a web application security hole was used to launch a targeted attack in order to steal money.
-This method has another advantage over a redirection page, as the final target is specified by a search string and not by a URL, bypassing smarter filters that know, or learn, that a URL as a parameter of a URL is most probably redirection.
-This specific poll distortion reported by Paul Lamere is unique since a group of hackers called 4chan, led by ""moot"", took the time to fight Time's humble attempts to mitigate automation. Among the measures and countermeasures that 4chan and Time exchanged are:
-This time a hacker succeeded in manipulating Time's poll for most influential people in 2009.
-To find for yourself how common is this vulnerability, just Google for SELECT, FROM and WHERE in the URL. Amazing.
",,4/14/2008,SQL Injection,Improper Input Handling,Leakage of Information,Government,USA,No,,,,,,,,
-To find for yourself how common is this vulnerability, just Google for SELECT, FROM and WHERE in the URL. Amazing.
",,4/14/2008,SQL Injection,Improper Input Handling,Leakage of Information,Government,USA,No,,,,,,,,
-Twitter announced that a hacker broke into 33 accounts including Obama's now inactive twitter. The hack is a result of a flaw in a web based support tool used by twitter, which where evidently accessible externally without proper authorization.
-Twitter is in the spotlights again. Mikeyy Mooney, the 17-year-old creator of StalkDaily.com, a Twitter alternative, admitted to hacking his giant competitor by implementing a worm that propagated itself through twitter making every affected user tweet about StalkDaily. Mikeyy certainly got the advertising and page views he was looking for.
-
-Uno presents a dilemma: he finds a vulnerability, exploits it to a limit and publish the results. Therefore the incident does not have a sizable outcome and not damage is done, but nevertheless it is interesting. We are not the only one to note that. Kasperski stressed the point the no data was actually compromised in their response to the event. So should we add it to WHID as an incident? should we skip it as just a vulnerability? for now we put them in.
-Purportedly hailing from an Indonesian hacking group, the hacker made unobtrusive defacements by inserting a text document into the homepages of six local council sites and two libraries.",http://www.networkworld.com/news/2010/050310-victorian-councils-libraries-taught-security.html,5/3/2010,Unknown,Improper Output Handling,Defacement,Government,Australia,No,,,Indonesia,,,,,
-Purportedly hailing from an Indonesian hacking group, the hacker made unobtrusive defacements by inserting a text document into the homepages of six local council sites and two libraries.",http://www.networkworld.com/news/2010/050310-victorian-councils-libraries-taught-security.html,5/3/2010,Unknown,Improper Output Handling,Defacement,Government,Australia,No,,,Indonesia,,,,,
-Very detailed records of geeks.com customers were stolen from the site. The records included name, address, telephone number, e-mail address, credit card number, expiration date, and most notoriously, card verification number (CVV).
-We all know that web security is highly important but neglected. We tell frightening stories but listners think they are only ""FUD"": fear, uncertainty and doubt, used to sell products and services. I hope that the VAServ incident will serve to warn that those are not fairytale stories. Even so, I wish this one would not have happened.
-We assume that he just guessed the password. Was it a trivial one? did he find a way to brute force it? Or was it something entirely different like yet another Twitter CSRF bug? time will tell.
",,2/17/2009,Unknown,Unknown,Leakage of Information,Web 2.0,USA,No,,,,,,,,
-We assume that he just guessed the password. Was it a trivial one? did he find a way to brute force it? Or was it something entirely different like yet another Twitter CSRF bug? time will tell.
",,2/17/2009,Unknown,Unknown,Leakage of Information,Web 2.0,USA,No,,,,,,,,
-We at the Web Hacking Incident Database try to provide the answer for this new age. I hope we help.
",,2/13/2009,Unknown,Unknown,Defacement,Media,,No,,,,,,,,
-We at the Web Hacking Incident Database try to provide the answer for this new age. I hope we help.
",,2/13/2009,Unknown,Unknown,Defacement,Media,,No,,,,,,,,
-We can hardly include every malware service site in WHID, after all there are hundred of thousands, if not millions, of those. Why pick on the Indian embassy in Spain? One good reason is that we finally got in an input from a reader and wanted to honor the event and include the incident. But there is another more important reason.
-We may never know who is right and who is wrong. LxLabs, just like Vaserv, is a tiny company using the Internet to look big. However one area that suffers a lot in small companies, is their security. It is never important enough to invest resource in security in such a lean and mean operations.
-West's story is somewhat ironic as he used his blog to remind users of the untruthfulness of his web presence.
-We where informed by sources at eBay the Korean sites parent company that the issue was not CRSF or seesion hijacking. The Attack_Method was not disclosed.
-Whenever we include a site inflicted with malware in WHID we need to explain why this one is worthy of WHID, after hundreds of thousands of web sites are planted with malware annually.
-When reviewing all the rappers incidents, my conclusion is that they are more susceptible to content spoofing because it is much easier for hackers to imitate their language and style.
",,1/23/2009,Insufficient Authentication,Insufficient Authentication,Disinformation,Entertainment,USA,No,,,,,,,,
-When reviewing all the rappers incidents, my conclusion is that they are more susceptible to content spoofing because it is much easier for hackers to imitate their language and style.
",,1/23/2009,Insufficient Authentication,Insufficient Authentication,Disinformation,Entertainment,USA,No,,,,,,,,
-While it is usually not considered a vulnerability in the application itself, I think that application that expose administrative or high privileges interface to the web should include authentication beyond a simple password. A school grading system is one example. The Twitter administrative interface hacked last week is another example.
-While officials in Indiana tried to write it off as a harmless prank played by a teenager, the U.S. Department of Justice has also been investigating the case, and they believe the same hacker is responsible for attempts on other state government web sites.
-While the actual technique used is not known, signs are that it was a web hack as it was done by a distributed network of bots all over the world and since the information stolen belonged to customers who paid online.
-While the information was pulled of line after a short period of time, it remained in the cache of several major search engines.
-While this may be nothing more than a joke, the capability to create a trend can have a huge and sometimes devastating effect. After all in recent months the future of big financial institutes was determined by the rumor mill.
-Why New Hampshire? Because the company has to report to the
authorities there about the incidents, but only specify the number of
individuals from this state affected. Why only New Hampshire? Since
regulations and bills requiring disclosures exist in many states, one
would expect that the company would have to provide such a testimonial
in many states. This incident is another good example of the size of
the hidden part of the iceberg.
-Wiki is one of those platforms that by design allow content be changed. It is its philosophy, and Wikipedia is the premier wiki out there. It is not a surprise that it is a prime target to content spoofing, as the story about the unexpected demise of two US senators during Obama's inauguration.
-You can find the technical details of the attack on Damon Cortesi's blog. You may also be interested in the full XSS payload.
",http://dcortesi.com/2009/04/11/twitter-stalkdaily-worm-postmortem/,4/11/2009,Cross Site Scripting (XSS),Improper Output Handling,Worm,Web 2.0,,No,,,USA,,,,,
-You can find the technical details of the attack on Damon Cortesi's blog. You may also be interested in the full XSS payload.
",http://dcortesi.com/2009/04/11/twitter-stalkdaily-worm-postmortem/,4/11/2009,Cross Site Scripting (XSS),Improper Output Handling,Worm,Web 2.0,,No,,,USA,,,,,
-You can read more about the unique security philosophy of Wikis in my recent article and presentation about the subject.
",,1/27/2009,Content Spoofing,Unknown,Disinformation,Web 2.0,USA,No,,,,,,,,
-You can read more about the unique security philosophy of Wikis in my recent article and presentation about the subject.
",,1/27/2009,Content Spoofing,Unknown,Disinformation,Web 2.0,USA,No,,,,,,,,
-You can read some of the funny things that the hacker published in different twitters on Read Write Web.
-Read more: http://newsbusters.org/?q=blogs/nb-staff/2010/04/10/newsbusters-back-here-s-some-what-you-ve-missed#ixzz0kuulCcnh",http://newsbusters.org/?q=blogs/nb-staff/2010/04/10/newsbusters-back-here-s-some-what-you-ve-missed,4/9/2010,Denial of Service,Insufficient Anti-automation,Downtime,Media,USA,No,,,,,,,,
-Read more: http://newsbusters.org/?q=blogs/nb-staff/2010/04/10/newsbusters-back-here-s-some-what-you-ve-missed#ixzz0kuulCcnh",http://newsbusters.org/?q=blogs/nb-staff/2010/04/10/newsbusters-back-here-s-some-what-you-ve-missed,4/9/2010,Denial of Service,Insufficient Anti-automation,Downtime,Media,USA,No,,,,,,,,
-Read more: http://www.foxnews.com/us/2011/04/20/minn-man-accused-hacking-facebook-accounts/#ixzz1KBSiqxBX",http://www.foxnews.com/us/2011/04/20/minn-man-accused-hacking-facebook-accounts/,4/21/2011,Social Engineering,Insufficient Password Recovery,Account Takeover,Web 2.0,"Palo Alto, CA",No,,,,Facebook,,,,
-Read more: http://www.foxnews.com/us/2011/04/20/minn-man-accused-hacking-facebook-accounts/#ixzz1KBSiqxBX",http://www.foxnews.com/us/2011/04/20/minn-man-accused-hacking-facebook-accounts/,4/21/2011,Social Engineering,Insufficient Password Recovery,Account Takeover,Web 2.0,"Palo Alto, CA",No,,,,Facebook,,,,
-Read more: http://www.nydailynews.com/news/ny_crime/2010/03/01/2010-03-01_wiseguys_tickets_charged_with_hacking_into_ticketmaster_livenation_to_illegally_.html?page=1#ixzz0iumX65AV",http://www.nydailynews.com/news/ny_crime/2010/03/01/2010-03-01_wiseguys_tickets_charged_with_hacking_into_ticketmaster_livenation_to_illegally_.html,3/1/2010,Brute Force,Insufficient Anti-automation,Loss of Sales,Entertainment,USA,No,,,Bulgaria,,,,,
-Read more: http://www.nydailynews.com/news/ny_crime/2010/03/01/2010-03-01_wiseguys_tickets_charged_with_hacking_into_ticketmaster_livenation_to_illegally_.html?page=1#ixzz0iumX65AV",http://www.nydailynews.com/news/ny_crime/2010/03/01/2010-03-01_wiseguys_tickets_charged_with_hacking_into_ticketmaster_livenation_to_illegally_.html,3/1/2010,Brute Force,Insufficient Anti-automation,Loss of Sales,Entertainment,USA,No,,,Bulgaria,,,,,
-Read More http://www.wired.com/threatlevel/2009/12/seven-eleven/#ixzz0iehheEY7",http://www.wired.com/threatlevel/2009/12/seven-eleven/,9/7/2014,SQL Injection,Improper Input Handling,Monetary Loss,Retail,USA,No,,,Russia,,"$2,000,000 ",,,
-Read More http://www.wired.com/threatlevel/2009/12/seven-eleven/#ixzz0iehheEY7",http://www.wired.com/threatlevel/2009/12/seven-eleven/,9/7/2014,SQL Injection,Improper Input Handling,Monetary Loss,Retail,USA,No,,,Russia,,$2000000,,,
-Read More http://www.wired.com/threatlevel/2010/03/hacker-bricks-cars/#ixzz0iYvPwUVj",http://www.wired.com/threatlevel/2010/03/hacker-bricks-cars/,3/17/2010,Administration Error,Insufficient Authorization,Data Loss,Automotive,"Austin TX, USA",No,,,"Texas, USA",,,,,
-Read More http://www.wired.com/threatlevel/2010/03/hacker-bricks-cars/#ixzz0iYvPwUVj",http://www.wired.com/threatlevel/2010/03/hacker-bricks-cars/,3/17/2010,Administration Error,Insufficient Authorization,Data Loss,Automotive,"Austin TX, USA",No,,,"Texas, USA",,,,,
-Read More on SEC filing - http://www.wired.com/images_blogs/threatlevel/2010/03/brocosec.pdf",http://www.esecurityplanet.com/news/article.php/3871176/Feds-Crack-Hackers-Stock-Manipulation-Cybercrime.htm,3/16/2010,Stolen Credentials,Insufficient Authentication,Monetary Loss,Finance,,No,,,"St. Petersburg, Russia",,"$600,000 ",,,
-Read More on SEC filing - http://www.wired.com/images_blogs/threatlevel/2010/03/brocosec.pdf",http://www.esecurityplanet.com/news/article.php/3871176/Feds-Crack-Hackers-Stock-Manipulation-Cybercrime.htm,3/16/2010,Stolen Credentials,Insufficient Authentication,Monetary Loss,Finance,,No,,,"St. Petersburg, Russia",,$600000,,,
-Redirect from php site to google POC and XSS
-Reports came in at the Google Webmaster Help forum where we learned the issue was around DNS servers being taken over and some users who replied on those DNS servers were being taken from Google.com.bd to this hacked version.",http://www.seroundtable.com/google-bangladesh-dns-hack-12773.html,1/10/2011,DNS Hijacking,Application Misconfiguration,Defacement,Search Engine,Bangladesh,No,,,,,,,,
-Reports came in at the Google Webmaster Help forum where we learned the issue was around DNS servers being taken over and some users who replied on those DNS servers were being taken from Google.com.bd to this hacked version.",http://www.seroundtable.com/google-bangladesh-dns-hack-12773.html,1/10/2011,DNS Hijacking,Application Misconfiguration,Defacement,Search Engine,Bangladesh,No,,,,,,,,
-Sample xss alert on phpbuilder.com
-Schools officials are now trying to contact everyone who might have been affected. Information stored in the database goes back 10 years.",http://www.wcnc.com/news/local/Personal-Information-of-Thousands-exposed-to-Internet-Hackers-120316064.html,4/19/2011,SQL Injection,Improper Input Handling,Leakage of Information,Education,South Carolina,No,,,,,,,25000,
-Schools officials are now trying to contact everyone who might have been affected. Information stored in the database goes back 10 years.",http://www.wcnc.com/news/local/Personal-Information-of-Thousands-exposed-to-Internet-Hackers-120316064.html,4/19/2011,SQL Injection,Improper Input Handling,Leakage of Information,Education,South Carolina,No,,,,,,,25000,
-'Scraping people???s information violates our terms. We have taken, and will continue to take, aggressive legal action against organisations that violate these terms,' Facebook???s director of policy communications, Barry Schnitt, told Wired.com.",http://www.dailymail.co.uk/news/article-1353643/Facebook-profiles-hacked-Dating-site-lifts-250-000-pictures-names.html,2/4/2011,Process Automation,Insufficient Anti-automation,Disinformation,Web 2.0,USA,No,,,,Facebook,,,,
-'Scraping people???s information violates our terms. We have taken, and will continue to take, aggressive legal action against organisations that violate these terms,' Facebook???s director of policy communications, Barry Schnitt, told Wired.com.",http://www.dailymail.co.uk/news/article-1353643/Facebook-profiles-hacked-Dating-site-lifts-250-000-pictures-names.html,2/4/2011,Process Automation,Insufficient Anti-automation,Disinformation,Web 2.0,USA,No,,,,Facebook,,,,
-Screenshots and proof of concept
-",http://www.gmanews.tv/story/218014/nation/manila-waters-website-hacked,4/17/2011,SQL Injection,Improper Input Handling,Defacement,Energy,"Manila, Philippines",No,,,,,,,,
-",http://www.gmanews.tv/story/218014/nation/manila-waters-website-hacked,4/17/2011,SQL Injection,Improper Input Handling,Defacement,Energy,"Manila, Philippines",No,,,,,,,,
-script src= http://kdjkfjskdfjlskdjf.com/kp.php
-