Anatomy of a Breach

Anatomy of a Breach: 2010 Year in Review — The Year Cyber Became a Domain of Warfare

> series: anatomy_of_a_breach —— part: 024 —— year: 2010 —— verdict: cyber_became_warfare<span class="cursor-blink">_</span>_

Hedgehog Security 31 December 2010 14 min read

2010: the year cyber became a domain of warfare.

If 2009 was the year cybercrime industrialised, 2010 was the year cyber became a recognised domain of warfare. Operation Aurora demonstrated that nation-states target commercial companies. Stuxnet proved that code can destroy physical infrastructure. WikiLeaks showed that the largest intelligence agencies in the world cannot prevent a determined insider from walking out with their most classified secrets. And across the UK, the pattern of data handling failures — NHS hard drives on eBay, Zurich Insurance's lost backup tape, ACS:Law's exposed email archive — continued to demonstrate that the most basic security controls remain unimplemented in organisations that should know better.

As the year closes, one final breach underscores the persistent vulnerability of even technically sophisticated organisations: the Gawker Media hack, in which attackers compromised the media company's internal systems and exposed 1.3 million user accounts — with passwords stored using the obsolete DES encryption algorithm. As Wired reported, the breach spawned mass credential-stuffing attacks across the internet, as attackers used the cracked Gawker passwords to access users' accounts on other platforms. It was a fitting end to a year that demonstrated, repeatedly, that security fundamentals matter more than sophistication.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Twelve months. Twelve lessons. The stakes got higher.

# Breach Key Lesson
013 Operation Aurora Nation-state APTs target commercial companies. Google's response set the standard for transparency.
014 Mariposa Botnet 12.7 million PCs controlled by amateurs using purchased malware. Cybercrime-as-a-service is real.
015 Gonzalez Sentenced 20 years for 174 million cards. Known, preventable vulnerabilities remain the most exploited.
016 Belvoir Park Hospital Physical security is cyber security. Criminals walked in and photographed the records.
017 WikiLeaks / Manning 750,000 classified documents. One insider. One writable CD. Trust is not a security control.
018 Stuxnet The first cyber weapon caused physical destruction. OT/ICS security became a national security concern.
019 AT&T iPad Email Breach An unauthenticated API exposed 114,000 email addresses. API security is not optional.
020 Zurich Insurance UK £2.28M fine for a lost unencrypted backup tape. Outsourcing does not outsource liability.
021 ACS:Law / Anonymous A DDoS attack exposed a misconfigured backup. Hacktivists target reputation, not profit.
022 NHS Hard Drives on eBay 252 drives sold with patient data intact. Paying for destruction does not mean it happened.
023 Zeus Botnet Arrests £60 million stolen through banking trojans. Phishing remains the number one attack vector.
024 2010 Year in Review + Gawker 1.3M Gawker accounts with DES-encrypted passwords. Credential reuse turns one breach into many.

What 2010 established permanently.

Cyber as a Domain of Warfare
Stuxnet proved that cyber attacks can cause physical destruction. Operation Aurora showed that nation-states conduct industrial espionage through cyber means. The <a href="/blog/sector-under-the-microscope-defence-supply-chain">defence supply chain</a> — and any organisation with valuable intellectual property — now operates in a threat landscape where nation-state adversaries are a reality.
The Insider Threat Is the Hardest to Stop
Manning's leak demonstrated that the most devastating breaches come from authorised users with legitimate access. The <a href="/blog/anatomy-of-a-breach-t-mobile-uk-insider">T-Mobile insider</a> from 2009 and Manning in 2010 established insider threat as a primary security concern — one that requires <a href="https://www.socinabox.co.uk/blog/data-loss-prevention-small-business">data loss prevention</a> and behavioural monitoring, not just perimeter defence.
Credential Security Became Critical
The Gawker breach — with 1.3 million accounts using DES-encrypted passwords — demonstrated the cascade effect of credential reuse. When users reuse passwords across services, one breach becomes many. <a href="/blog/from-the-hacker-desk-cracking-passwords-afternoon">Our password cracking article</a> shows how quickly weak hashes fall. The answer is multi-factor authentication and unique passwords — controls that <a href="/cyber-essentials">Cyber Essentials Danzell</a> now mandates through its MFA auto-fail criterion.
UK Data Handling Failures Persisted
Despite the HMRC and MoD lessons of 2007–2008, UK organisations continued to lose data through basic failures: unencrypted backup tapes, hard drives sold on eBay, misconfigured web servers. The gap between policy and implementation — between knowing what to do and actually doing it — remained the UK's primary security weakness.

What comes next: the 2011 acceleration.

The trends established in 2010 will accelerate dramatically. 2011 will bring the Sony PlayStation Network breach (77 million accounts), the RSA SecurID hack, the HBGary Federal humiliation, and the LulzSec rampage — a year where the frequency and audacity of breaches will make 2010 look restrained. The Anatomy of a Breach series continues through the decade.

The organisations that will survive what is coming are the ones building their defences now — through penetration testing that finds the vulnerabilities before attackers do, Cyber Essentials certification that establishes the baseline, SOC in a Box that monitors continuously, and incident response capability that is ready when prevention fails. The cost of implementing these controls is a fraction of the cost of not implementing them — as every breach in this series has demonstrated.


2010 established the threat landscape. 2011 will test it. Are you ready?

Every breach we examined in 2009 and 2010 was preventable with controls that exist today. <a href="/penetration-testing">Penetration testing</a> finds the gaps. <a href="/cyber-essentials">Cyber Essentials</a> closes the baseline. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors the perimeter. <a href="https://www.cyber-defence.io">UK Cyber Defence</a> responds to incidents. Start now.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles