Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCyber Case Studies

Notorious cybersecurity attacks in history and how to prevent them

By Jon Lucas
Cybersecurity breaches: a history and what you can learn
January 27, 2021

Over the years we have seen how organizations have lost huge sums of money to cybersecurity attacks. A 2017 report from Cybersecurity Ventures predicted ransomware damages would cost the world $11.5 billion in 2019 and it is estimated that costs will reach $20 billion by 2021. When it comes to cybersecurity, companies still have a lot of work to do to find ways to anticipate and avoid data breaches. Let’s take a look at a few of the most notorious cybersecurity attacks that have happened over the last few decades and see what we can learn.

 

NASA and U.S. Defense Department - 1999

In 1999, a 15-year-old hacker named Jonathan James managed to shut down NASA’s computers for a total of 21 days. The hacker gained access to 13 computers at the Marshall Space Flight Center and was able to download $1.7 million worth of NASA proprietary software. The hacker gained access through a router and installed a back door for access. In doing so, he managed to access thousands of messages, usernames and passwords, as well as source code for the International Space Station.

According to NASA, “the software [purported to be worth $1.7 million] supported the International Space Station’s physical environment, including control of the temperature and humidity within the living space.” Having systems down for three weeks cost NASA a total of $41,000. 

Advice: Rectify and fortify - your code is only as strong as its weakest part. 

Performing regular revisions of software and hardware can help your enterprise spot possible vulnerabilities and patch them before they've been exploited. It's important to keep equipment up to date and perform regular patch cycles on them. It's worth nothing to enforce security policies on your employees if your equipment is vulnerable to external attacks.

 

The Melissa virus - 1999

The Melissa virus was a mass-mailing macro virus targeting Microsoft Word and Outlook-based systems. While the actual damage was minimal other than slowing connection speeds to a crawl, panic spread like wildfire with companies shutting down their internet connections. The hacker, David Smith, placed the virus hidden inside a file that promised usernames and passwords to fee-based adult websites. Once downloaded and opened using a Word doc, the virus was activated and spread through the system. This became the first successful mass-mailing worm and while it looked like a simple virus, it cost a total of $80 million in damage.

Advice: Avoid downloading random files from the internet and opening them. 

It's well known how many attacks are due to a human error. Therefore, enforcing security policies and training staff is vital to ensure your systems and data are safe.

 

Heartland Payment system - 2008

Payment processing company Heartland’s systems were compromised by malware through a SQL injection attack. This is one of the most dangerous and commonly exploited vulnerabilities to steal data. Old and vulnerable code was not identified in annual internal and external audits, allowing hackers entry into the system. The intruders managed to bypass various antivirus packages, installing sniffer software that captured payment card data, focusing on stealing data in transit. Even though the company had been warned by security analysts, Heartland didn’t seem to worry. The breach was discovered almost a year later by Visa and MasterCard and cost a reported $200 million.

Advice: Listen to security specialists and don’t assume third-party software is secure; respond quickly to a breach.

 

WannaCry 2017

In 2017, a global ransomware attack known as WannaCry affected a number of countries and sectors. This type of malware encrypts user data and demands a ransom. Despite the fact that it started spreading around the world in 2017, this ransomware worm is still live on the internet and can also be found under the names WannaCrypt, WanaCrypt0r, WRrypt, and WCRY. WannaCry combines two malicious software components — a worm that spreads rapidly without user interaction, and a ransomware that encrypts user files and then asks for money in order to decrypt the files.

Advice: Update and protect your systems. 

Having backups and storing work on a network share can minimize the losses. Ensure your Enterprise updates systems and don't allow personal emails to be opened on work laptops or PCs.

 

The World Health Organization - 2020

The World Health Organization was recently the victim of a cybersecurity attack. Various groups working on the coronavirus pandemic saw staff emails and passwords dumped online, including the National Institutes of Health, the World Health Organization and the Gates Foundation. How did it happen? There’s not a clear answer as no one knows where or when the data breach came from or if the passwords and email addresses gave hackers an entry point. It is thought that the ‘Elite Hackers’ might be behind this cyberattack where nearly 25,000 email addresses and passwords were leaked.

Advice: Check your vulnerabilities and do not rely on antivirus software or blindly trust in new software.

It is important to perform penetration tests regularly. Relying on professionals can help your enterprise to identify new vulnerabilities. Keep your OS and apps up to date.

 

KEYWORDS: cyber security cyber security threats cybersecurity defense cybersecurity preparedness

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jon Lucas is Co-Director at Hyve Managed Hosting.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • online shopping cyber security

    Top 3 online retail fraud methods and how to prevent them in 2022

    See More
  • ransomware

    Ransomware Attacks: Strategies to Recover and Prevent Them

    See More
  • identity-security

    The top identity-based attacks and how to stop them: Part 1

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing