> series: anatomy_of_a_breach —— part: 036 —— year: 2011 —— verdict: the_year_everything_was_hacked<span class="cursor-blink">_</span>_
No year in the history of cybersecurity has matched 2011 for the sheer volume, diversity, and audacity of breaches. Authentication infrastructure was compromised (RSA SecurID) and used to breach the world's largest defence contractor (Lockheed Martin). A gaming platform with 77 million accounts went dark for 23 days (Sony PSN). A hacktivist group embarrassed the NHS, the CIA, and the US Senate in the same month (LulzSec). A certificate authority was destroyed overnight (DigiNotar). A 168-year-old newspaper was shut down over voicemail hacking (News of the World). And as a final flourish, Anonymous closed the year by hacking intelligence firm Stratfor on Christmas Eve — leaking 860,000 email addresses, 75,000 credit card numbers (stored unencrypted), and five million internal emails.
The Stratfor hack was vintage Anonymous: the stolen credit cards were used to make donations to charities including the Red Cross and Save the Children, the leaked emails exposed embarrassing details about Stratfor's intelligence operations and client relationships, and the attack exploited the same basic vulnerability — unencrypted credit card storage and weak authentication — that had defined breaches throughout the year. It was a fitting end to the year everything was hacked.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call| # | Breach | Key Lesson |
|---|---|---|
| 025 | HBGary Federal | A security firm hacked through SQL injection and password reuse. Nobody is too expert to be hacked. |
| 026 | RSA SecurID | One phishing email compromised the authentication tokens protecting the defence industry. |
| 027 | Comodo CA | Fake SSL certificates for Google, Yahoo, and Skype. The padlock lied. |
| 028 | Sony PSN | 77 million accounts. 23 days offline. The ICO said it 'could have been prevented.' |
| 029 | Lockheed Martin | Stolen RSA tokens used to breach the world's largest defence contractor. Supply chain cascades are real. |
| 030 | LulzSec 50 Days | NHS, CIA, Sony, PBS, Senate — all hacked 'for the lulz' using basic techniques. |
| 031 | News of the World | Default voicemail PINs enabled industrial-scale phone hacking. A newspaper was destroyed. |
| 032 | Operation Shady RAT | 72 organisations in 14 countries compromised over five years. Nobody noticed. |
| 033 | DigiNotar | 531 fake certificates. 300,000 Iranians surveilled. The CA was destroyed in three weeks. |
| 034 | NHS Trust Fines | Wrong-number faxes, hard drives on eBay, accidental publications. The NHS pattern would not break. |
| 035 | Steam / Valve | 35 million accounts. But hashed passwords and encrypted cards limited the damage — proving that good storage controls matter. |
| 036 | Stratfor + Year in Review | 860,000 emails, 75,000 unencrypted credit cards, stolen on Christmas Eve. The year ended as it began. |
If 2011 was the year everything was hacked, 2012 will bring the LinkedIn breach (117 million accounts), the Dropbox breach (68 million accounts), and the continued evolution of state-sponsored espionage. The attacks will grow larger, the techniques will grow more sophisticated, and the consequences — financial, regulatory, and reputational — will grow more severe. The Anatomy of a Breach series continues.
The controls that would have prevented every breach in 2011 are the controls we test and implement today: penetration testing to find the SQL injections and unpatched systems, Cyber Essentials certification to establish baseline controls, SOC in a Box to monitor continuously, and incident response capability for when prevention fails. Three years of this series have demonstrated one consistent truth: the organisations that test proactively survive. The organisations that do not become the next article.
<a href="/penetration-testing">Penetration testing</a>. <a href="/cyber-essentials">Cyber Essentials</a>. <a href="https://www.socinabox.co.uk">SOC in a Box</a>. <a href="https://www.cyber-defence.io">Incident response</a>. The four pillars. Start now.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call