> series: anatomy_of_a_breach —— part: 024 —— year: 2010 —— verdict: cyber_became_warfare<span class="cursor-blink">_</span>_
If 2009 was the year cybercrime industrialised, 2010 was the year cyber became a recognised domain of warfare. Operation Aurora demonstrated that nation-states target commercial companies. Stuxnet proved that code can destroy physical infrastructure. WikiLeaks showed that the largest intelligence agencies in the world cannot prevent a determined insider from walking out with their most classified secrets. And across the UK, the pattern of data handling failures — NHS hard drives on eBay, Zurich Insurance's lost backup tape, ACS:Law's exposed email archive — continued to demonstrate that the most basic security controls remain unimplemented in organisations that should know better.
As the year closes, one final breach underscores the persistent vulnerability of even technically sophisticated organisations: the Gawker Media hack, in which attackers compromised the media company's internal systems and exposed 1.3 million user accounts — with passwords stored using the obsolete DES encryption algorithm. As Wired reported, the breach spawned mass credential-stuffing attacks across the internet, as attackers used the cracked Gawker passwords to access users' accounts on other platforms. It was a fitting end to a year that demonstrated, repeatedly, that security fundamentals matter more than sophistication.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call| # | Breach | Key Lesson |
|---|---|---|
| 013 | Operation Aurora | Nation-state APTs target commercial companies. Google's response set the standard for transparency. |
| 014 | Mariposa Botnet | 12.7 million PCs controlled by amateurs using purchased malware. Cybercrime-as-a-service is real. |
| 015 | Gonzalez Sentenced | 20 years for 174 million cards. Known, preventable vulnerabilities remain the most exploited. |
| 016 | Belvoir Park Hospital | Physical security is cyber security. Criminals walked in and photographed the records. |
| 017 | WikiLeaks / Manning | 750,000 classified documents. One insider. One writable CD. Trust is not a security control. |
| 018 | Stuxnet | The first cyber weapon caused physical destruction. OT/ICS security became a national security concern. |
| 019 | AT&T iPad Email Breach | An unauthenticated API exposed 114,000 email addresses. API security is not optional. |
| 020 | Zurich Insurance UK | £2.28M fine for a lost unencrypted backup tape. Outsourcing does not outsource liability. |
| 021 | ACS:Law / Anonymous | A DDoS attack exposed a misconfigured backup. Hacktivists target reputation, not profit. |
| 022 | NHS Hard Drives on eBay | 252 drives sold with patient data intact. Paying for destruction does not mean it happened. |
| 023 | Zeus Botnet Arrests | £60 million stolen through banking trojans. Phishing remains the number one attack vector. |
| 024 | 2010 Year in Review + Gawker | 1.3M Gawker accounts with DES-encrypted passwords. Credential reuse turns one breach into many. |
The trends established in 2010 will accelerate dramatically. 2011 will bring the Sony PlayStation Network breach (77 million accounts), the RSA SecurID hack, the HBGary Federal humiliation, and the LulzSec rampage — a year where the frequency and audacity of breaches will make 2010 look restrained. The Anatomy of a Breach series continues through the decade.
The organisations that will survive what is coming are the ones building their defences now — through penetration testing that finds the vulnerabilities before attackers do, Cyber Essentials certification that establishes the baseline, SOC in a Box that monitors continuously, and incident response capability that is ready when prevention fails. The cost of implementing these controls is a fraction of the cost of not implementing them — as every breach in this series has demonstrated.
Every breach we examined in 2009 and 2010 was preventable with controls that exist today. <a href="/penetration-testing">Penetration testing</a> finds the gaps. <a href="/cyber-essentials">Cyber Essentials</a> closes the baseline. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors the perimeter. <a href="https://www.cyber-defence.io">UK Cyber Defence</a> responds to incidents. Start now.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call