The Top 10 Biggest Cyber Attacks Of 2021 | Expert Insights (2024)

2021 was a year that carried forward a lot of the chaos from 2020. This couldn’t be truer for cybersecurity, as we saw seemingly almost every kind of attack increase exponentially in number and grow in sophistication.

In fact, according to arecent report by SonicWall,2021 sawransomware attacksincrease by 105% from the previous year and encrypted threats rise by 167%.While ransomware might have been front and center in the report, there were also significant concerns overphishingandbusiness email compromise (BEC)attacks, which also saw significant rises.

As business-aimed attacks have continued to increase in severity, cost, and sheer prevalence throughout 2022, we’ve rounded up some of the most high-profile cases that hit headlines last year—and how they could potentially have been prevented. The suggestions made, however, aren’t standalone and work best when working in tandem with each other.

While we pride ourselves on accuracy, we like to note that this isn’t an exhaustive list and barely scratches the surface of the sheer scale of cyberattacks that occurred throughout all of 2021 but includes a portion of the ones everyone was talking about last year.

Without further ado are (some of) the highest profile cyberattacks of 2021:

Microsoft Exchange Attack, January – March

When governments and businesses were still reeling from the SolarWinds attack of December 2020, opportunistic attackers from a Chinese hacking group took advantage of the residual chaos to instigate their own attack against Microsoft’s Exchange Server. The group, called Hafnium, are usually associated with espionage, and historically have frequently leveled attacks at US organizations.

Rather than instigating a single attack, the perpetrators conducted waves of attacks after their four successful zero-day exploits granted attackers access to user emails and passwords, admin privileges, and access to connected devices within the network on affected servers. Hackers were able toaccess the accounts of at least 30,000 organizations in the USA alone, with 250,000 globally reported as being affected.

By the end of March, Microsoft had announced that nearly all servers affected by the attack had been patched and mitigated. It was still costly and time consuming to rectify, however, and caused significant damage to companies who had suffered subsequent breaches and attacks as a result.

These waves of attacks were borne out of multiple vulnerabilities within the network that attackers took advantage of. Companies can sidestep this issue by ensuring that their network perimeter stays secure by employing a strong, automated patch management solution that finds vulnerabilities and patches them before they result in a breach.

For more on patch management and how it actually works and why you might need it, read on in our blog:

What Is Patch Management?

Accellion Supply Chain Attack, January

As we saw with Microsoft, even trusted tech providers aren’t safe from experiencing devastating attacks and breaches. And security software specialist Accellion (now Kiteworks) is no exception.

In late January, the company reported a successful supply chain attack that affected many of its high-profile clients. Supply chain attacks involve an attacker infiltrating a company network through an affiliated partner, suppliers or any other party that would have access to the network.

In this instance, Accellion was the “secondary” target, as attacking through it gave threat actors access to numerous Accellion customers and partners. The attack was achieved via a zero-day attack that targeted Accellion’s File Transfer Appliance (FTA) software. Hackers were able to find a P0 vulnerability in the software to exploit and launch a widespread attack with four zero-day attacks.

Of Accellion’s 300 clients, roughly100 were affected by this breach. Big names like Kroger, Reserve Bank of New Zealand, and the University of Colorado were affected. Remediation of the vulnerabilities and breach for both Accellion and their affected customers tookweeksto achieve.

The zero-day attack was successful in that it also took advantage of vulnerabilities within Accellion’s network perimeter, much like what we saw with the Microsoft Server attack. A robust patch management software solution that automatically searches for and patches vulnerabilities is a must for most organizations:

The Top 10 Patch Management Software For Business

Florida Water Supply, February

In an attack thaterred more on the side of horrifying and harmful than actually financially damaging, a hacker managed to—albeit briefly—take control of a Floridian city Oldsmar’s water supply and change the amount of lye in the supply to dangerous levels. Lye is used in water supplies to treat the water, but in high enough levels can cause serious harm if touched or ingested.

In the early stages of the attack, a plant operations employee noticed that their cursor was moving on its own and setting the amount of lye to dangerous levels. After quickly reverting the levels back down to where they should be, the employee raised the breach with their superiors.

The remote-access system, TeamViewer—used by employees and what was used by the hacker to access the operating systems—was disabled in response. TheFBI released a statementthat they suspected poor password hygiene and out-of-date software were the cause of the issue. It was alsofurther reported that credentials tied to the plant had been leaked prior.

While poisoning the water supply with lye sounds like something Arthur Conan Doyle would write about, the method to instigate this potentially harmful attack was less Victorian in nature.It was later suspected bysecurity firm Dragosthat the origin of the attack could have also stemmed from a watering hole attack—an attack that compromises a particular site visited by the actual target rather than directly attacking the target itself.

Dragos reported that it had found damaging code inserted into a WordPress-run website affiliated with a Floridian water infrastructure construction company that liaises with the Oldsmar water plant. With the code inserted, attackers were able to harvest information, including operating systems, browsers, touchpoints, input methods, what hardware was in use such as cameras and microphones, and much more. Dragos’ best guess was that threat actors harvested this information to help improve the botnet malware’s ability to mimic legitimate web browser activity.

Making sure credentials don’t become compromised is a critical part of overall strong password hygiene. You can do this bymaking them hard to guess and having them regularly rotated and changed whenever there’s a detected breach, as well asthrough the deployment of apassword manager.

Australia Channel 9 News Ransomware Attack, March

In March, threat actors were successfully able to disruptAustralia’s Channel 9 News live broadcast, preventing the channel from airing several other shows and affecting 9 News’ print production. The confirmed ransomware attack, in addition to successfully taking shows off the air, alsolocked staff out of their emails, blocked their internet access, and halted print production systems. At the time, it was the largest cyber-attack on an Australian media company.

After isolating the incident, admins were able to bring production back online but only after several hours of disruption to operations. While it was never made public or discovered what the root cause was, 9 News admins suspected it was probablyeitherdue to vulnerabilities that hadn’t been patched or from a phishing email,yet the possibility of a state-sponsored attack hadn’t been ruled out either and at the time they closely consulted with the Australian Signals Directorate and the Australian Cyber Security Centre.

No ransom was reported as being requested and nor was one paid, with 9 News working onremediationof the issue.

Having strong anti-phishing solutions in place can prevent your employees from inadvertently downloading malicious code that acts as a gateway for a ransomware attack. Most phishing attacks occur via email, soenhancing email securityis an excellent preventative step against ransomware attacks.

CNA Financial Ransomware Attack, March

Ransomware attacks are particularly devastating, as companies can experience severe financial losses from disruption in activities. And, more often than not, companies can’t afford the downtime, which results in them paying the ransom to get servers back up and running.

Theransomwareattack leveled at CNA Financial, a finance company based in Chicago, had this unfortunate end result, with CNA paying a hefty $40 million ransom in exchange for the key to un-encryptit*files and data. Inits report,it noted that the breach had affected a staggering 75,349 individuals.

So, how did it happen?

Phoenix, the attacker group responsible for the hack, used a type of malware called Phoenix Locker, which was derived from Hades—a popular form of ransomware created by REvil. The ransomware works by masquerading as a browser update which entices employees into downloading it before moving laterally across the network until it can gain enough privilege to identify important and sensitive data. It then continues by sending copies outside of the network and encrypts data at rest in the network and instigating the ransom attack.

A couple of tools appropriately deployed and configured could’ve prevented and mitigated the attack here.Data loss prevention solutions, when properly configured, can prevent sensitive data from leaving the network if the solution notices that certain information or data is leaving the network without proper authorization.

The second important measure that could have helped in this instance is security awareness training (SAT). The entire attack was instigated by employees clicking and downloading on a bogus browser update, which worked as an attack vector for Phoenix. Having staff appropriately trained to spot these tactics and respond accordingly could have prevented the breach.

Not sure what SAT is? Check out our guide:

Ultimate Guide To Security Awareness Training

Quanta Ransomware Attack, April

Quanta is an original design manufacture (ODM) supplier to Apple,Dell, Lenovo, Cisco, Microsoft, and others,who were hit with a financially crippling ransomware attack in April last year by Russian ransomware-as-a-service group, with perhaps the most appropriate, Resident Evil-esque name ever, REvil. While not quite Umbrella Corporation level, they’re still able to do a lot of damage and requested a cool $50 million by way of ransom.

Initially, the attack began with REvil demanding the ransom from Quanta in exchange for all data they had encrypted in the attack, but after accessing the server and acquiring unreleased designs for future products, REvil quickly changed tactics and demanded the sum from Apple in exchange for not leakingmoredesigns for future products.

While the exact specifications of the attack are unclear,it was reported by Quantathat only a small part of the network had actually been affected by the breach and that they were working closely with local authorities to contain and remediate the attack.

REvil did make good on their promises to release designs until the ransom was paid, insisting that the ransom needed to be paid by May 1 of that year. However, as luck may have it, the situation de-escalated just as quickly as it had begun, with all Apple-related content disappearing from the attackers’ website. At the time, it left us in the dark about what actually happened and why the ransomware attack seemingly ran out of steam, but as it happens Quanta hadn’t been its only target and plenty of other countries and organizations had personal beef with the ransomware group. REvil had targetedAcer with another $50 million ransom attackearlier that year, amongst plenty of others in the past. In a joint operation between several governments,REvil was targeted and hacked last year and their operations disbanded.

While Quanta and Apple might have had a happy ending in this particular instance, it was still a high-profile case in that a ransomware attack was able to significantly affect and target a huge–and ironically–, tech company, showing that no one is truly safe.

Ransomware attacks are particularly devastating as in addition to the ransomware fee, they can also run costs accrued via lost business and downtime needed to get operations up and running again, so safeguarding against these types of attacks is critical:

How To Stop Ransomware Attacks

Brenntag Ransomware Attack, April

In April, hackers successfully deployed a high-profile ransomware attack against German chemical distribution company Brenntag. Brenntag is a large corporation and a world leader in their field, with thousands of employees across the world at over 670 locations.

The perpetrators in this scenario were hacker group DarkSide, who netted an eye-watering $4.4 million ransom paid for in Bitcoin by Brenntag in a bid to prevent stolen data from being released and for the key to decrepit their files to be handed over.

The attack, which focused on the North American side of the business, managed to encrypt the company network andsteal 150GB of data, including highly sensitive personal information pertaining to the company’s employees.

The ransom had originally been much higher but was reduced to $4.4 million after negotiations. Part of these negotiations included DarkSide telling Brenntag how they managed to pull off the attack. When it came down to it, the “gateway” to this attack turned out to bestolen credentials, or so DarkSide claims.

This article has already stressed the importance of proper management of credentials and strong password hygiene, but it’s also worth pointing out that alongside this, having sensitive data and information stored elsewhere is also a beneficial step in mitigating risk and data losses from ransomware attacks. Cloud storage solutions can store data away from the main network, making it more difficult for attackers to access.

Colonial Pipeline Ransomware Attack, May

And who could forget the Colonial Pipeline ransomware attack of May 2021?

For those not in the know, the Colonial Pipeline is an oil pipeline that delivers gasoline and jet fuel to a large number of states in the southeastern part of the USA. The pipeline saw the halting of production while the company worked to contain and respond to the threat. The pause in production resulted in the cancellation of flights and fuel shortages, the latter of which was exacerbated by panic buying.

After some deliberation, and in a move that was overseen by the FBI, the company paid the $4.4 million ransom within a few hours of receiving the ransomware notification in exchange for the decryptor needed to bring the network back up. However,the processing time for this was incredibly longwhich resulted in the company having to use planning tools and time and effort in getting everything up and running again anyway.

But how did this all happen? Well, the attack vector into the Colonial Pipeline’s network turned out to bea set of compromised credentials. Strongly suspected that the credentials in question were acquired from the dark web,the account in question reportedly was no longer in use and was regarded as a dead account—except for the fact that it still could provide access to the Pipeline’s network.

It’s unsurprising, seeing asstolen credentials account for 61% of all breaches. It was further reported that the account that led to the breach and subsequent ransomware attackdidn’t have multi-factor authentication in place either.

Having a robust identity and access management (IAM) solution in place perhaps would’ve circumvented the issue. IAM solutions combine the processes of identifying, managing, and authorizing accounts within a system. This usually entails having a database that contains all user identities and access privileges, tools to help manage these privileges including monitoring them, and a system that enables the auditing of login and access history.

Regularly cleaning up accounts and removing any dead and unused accounts would have proven beneficial in preventing the breach. Any unused or dead accounts are often left unmanaged and forgotten about, which is a huge risk. Every single set of credentials—used or not—are entry points into a network and therefore potential attack vectors, and need to be managed accordingly.

The Top 10 Identity And Access Management Solutions

JBS Foods Ransomware Attack, May

JBS Foods is a Brazilian company that is one of the largest meat processing companies in the world and supplies one-fifth of the world’s meat. It was alsohit with a particularly devastating ransomware attack in spring, 2021.

The ransomware attack was highly successful in halting production in the US, Canada, and Australia, before JBS paid the ransom of $11 million in bitcoin to resume production—one of the largest ransom payments to date. Prior to the ransom,JBShad apparently consulted with cybersecurity experts and made the decision to prevent any more data exfiltration and pay the ransom.

While no one took credit for this attack, it is still strongly suspected that Russian hacking group REvil was to blame, though the incident was being investigated by the FBI to find the culprits. Since the attack, it hasn’t come to light who was behind the attack or indeed the specifics of how the attack actually functioned.

However, data exfiltration took place in the two months preceding June 1 when the attack hit and JBS staff found their network encrypted. Data exfiltration was directed towards the file-sharing site Mega, along with some other locations. Prior to this,Security Scorecardfound in their research that leaked credentials belonging to JBS Australia employees had been found on the dark web, adding to suspicions that a breach had occurred in February of that year.

While the situation remains unclear as to how the attack actually happened, it’s clear that data loss prevention tools, IAM solutions, and patch management could have potentially mitigated risk.

Kaseya VSA Ransomware Attack, July

The Kaseya VSA ransomware attack was also perpetrated by Russian (or at the least, Russian speaking) hacking group, REvil. Kaseya is a software company specializing in IT products that are particularly suited for MSPs.

The whole issue actually began in April, whenKaseya was made aware of seven, easy-to-spot vulnerabilities in their software by the Dutch Institute for Vulnerability Disclosure. While there was considerable effort to patch these vulnerabilities, Kaseya was not able to patch all of them in time, leading to REvil’s attack in early July.

The root cause of the attack stemmed from Kaseya’ Virtual System Administrator, which is a remote monitoring and management software tool that became compromised. Attackers spread the ransomware through hosts managed by the software and increase the overall attack surface. The company, in response, shut down the VSA’s cloud and SaaS servers.

By mid-to-late July,Kaseya had announced that they had received the key to unlock all remaining encrypted files from a“trusted third party”and that they were working closely with still affected businesses within their network. While they had not paid the ransomware to REvil and had worked hard to contain the issue, significant financial losses were still accrued from heavy downtime and anywhere from800 to 1500 business had been affected.

Like with the Microsoft Exchange attack listed above, Kaseya’s ransomware attack stemmed from vulnerabilities within their network which hadn’t been patched yet. Having a strong patch management solution in place can mitigate the brunt of attacks if properly configured and automated, as mentioned above.

The Top 10 Biggest Cyber Attacks Of 2021 | Expert Insights (2024)

FAQs

What was the biggest cyber attack in 2021? ›

Without further ado are (some of) the highest profile cyberattacks of 2021:
  • Microsoft Exchange Attack, January – March. ...
  • Accellion Supply Chain Attack, January. ...
  • Florida Water Supply, February. ...
  • Australia Channel 9 News Ransomware Attack, March. ...
  • CNA Financial Ransomware Attack, March. ...
  • Quanta Ransomware Attack, April.
Mar 28, 2023

What is 90% of cyber attacks? ›

Social engineering and phishing are involved in 70% to 90% of all successful cybersecurity attacks. No other initial root hacking cause comes close. This is not a recent development. Social engineering has been the number one type of attack since the beginning of networked computers.

What was the biggest cybersecurity attack? ›

Biggest Cyber Attacks in History
  • Marriott Hotel Data Breach. ...
  • WannaCry Ransomware. ...
  • Ukraine Power Grid Attack. ...
  • The 2014 Yahoo Attack. ...
  • Adobe Cyber Attack. ...
  • The PlayStation Network Attack. ...
  • Estonia Cyber Attack. ...
  • The NASA Cyber Attack.
Jan 23, 2024

What are the recent major cyber attacks? ›

New / recently added
  • Cyber attack on colleges in Canada.
  • Cyber attack on a university in French Guiana.
  • Cyber attack on a city government in Kansas, USA.
  • Cyber attack on a school district in the state of New York, USA.
  • Cyber attack on a technology company in Germany?
  • Cyber attack on a shoe retail company in Germany.

What is the biggest cyber threat to the US? ›

In terms of the threats the U.S. faces, nation-state hackers are the most serious. Russia presents the most sophisticated cyber threat, with China as a close second. The U.S. has implicated Russia in efforts to hack U.S. political entities such as the Democratic National Committee.

Do cyber attacks happen every 11 seconds? ›

In 2022, businesses around the globe face a ransomware attack every 11 seconds. Statistics on how many cyber attacks happen per day inform us that in 2022, businesses fall victim to ransomware attacks every 11 seconds. This marks a 20% increase from 2019.

Who's been hacked recently? ›

  • Turkish Hackers Claim Responsibility for Qatar National Bank Breach. ...
  • Hackers Leak Personal Information of 30,000 FBI and DHS Employees. ...
  • 250 Hyatt Hotels Across 50 Countries Hit by Data Breach. ...
  • Another Hotel Chain Gets Hit: Hilton Reports Payment Card Breach. ...
  • Superfish-style Certificates Installed by Dell Support Tools.

What country gets hacked the most? ›

According to Polish Cyberspace Defense Forces, during February 2024, Poland has become the most attacked country in the world with over 1000 cyber-attacks on organizations occurring per week.

What are the top 10 types of cyber attacks? ›

Common types of cyberattacks
  1. Malware. Cyberattackers use harmful software such as spyware, viruses, ransomware, and worms known as malware to access your system's data. ...
  2. Phishing. ...
  3. Spoofing. ...
  4. Backdoor Trojan. ...
  5. Ransomware. ...
  6. Password attacks. ...
  7. Internet of Things attack. ...
  8. Cryptojacking.
Jan 24, 2024

What are the 10 common web security threats? ›

The 10 Most Common Web Attacks
  • Cross-Site Scripting. ...
  • SQL Injection Attacks. ...
  • Broken Authentication. ...
  • Drive-By Download. ...
  • Password-Based Attacks. ...
  • Fuzzing. ...
  • Using Components with Known Vulnerabilities. ...
  • DDoS (Distributed Denial-of-Service)
Mar 13, 2024

What are the biggest cyber threats in 2024? ›

Generative AI (GenAI), unsecure employee behavior, third-party risks, continuous threat exposure, boardroom communication gaps and identity-first approaches to security are the driving forces behind the top cybersecurity trends for 2024, according to Gartner, Inc.

Who is the biggest hacker in history? ›

Kevin Mitnick is one of the most famous black-hat hackers turned ethical hackers in history and is considered by many to be the no 1 hacker in the world. Mitnick's early years were marked by his extraordinary talent for hacking and manipulation of computer systems.

What is the number one cause for most cyber attacks? ›

8 Most Common Causes of Data Breach
  • Weak and Stolen Credentials, a.k.a. Passwords. ...
  • Back Doors, Application Vulnerabilities. ...
  • Malware. ...
  • Social Engineering. ...
  • Too Many Permissions. ...
  • Insider Threats. ...
  • Physical Attacks. ...
  • Improper Configuration, User Error.

What is the oldest cyber attack? ›

Technically, the very first cyberattack occurred in France in 1834. Two thieves stole financial market information by hacking the French Telegraph System. There were other “hackers” who emerged over the years to disrupt phone service and wireless telegraphy, but it wasn't until 1940 that things got really interesting.

How much money was lost to cyber attacks in 2021? ›

The FBI report details more than 800,000 cyber crime-related complaints filed in 2022. Meanwhile, total losses were over $10 billion, shattering 2021's total of $6.9 billion, according to the bureau's Internet Crime Complaint Center (IC3).

What is the data breach in March 2021? ›

On 18 March 2021, an affiliate of ransomware cybergang REvil claimed they had stolen unencrypted data from Taiwanese hardware and electronics corporation Acer, including an undisclosed number of devices being encrypted, with cybersecurity firm Advanced Intel linking this data breach and ransomware attack to the ...

Did Acer pay the ransom? ›

The ransomware group offered a 20% discount on the $50 million demand if Acer paid by March 17, 2021. That date lapsed, as has the 28th, without any news of a payment.

What are the malware attacks in 2021? ›

There were nearly 500 million ransomware attacks in the first half of 2021. As reported by Help Net Security, security researchers detected 190.4 million ransomware attempts in Q3 2021 alone, which brought the total volume of attacks up to 470 million at the beginning of October.

Top Articles
Latest Posts
Article information

Author: Twana Towne Ret

Last Updated:

Views: 6311

Rating: 4.3 / 5 (44 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Twana Towne Ret

Birthday: 1994-03-19

Address: Apt. 990 97439 Corwin Motorway, Port Eliseoburgh, NM 99144-2618

Phone: +5958753152963

Job: National Specialist

Hobby: Kayaking, Photography, Skydiving, Embroidery, Leather crafting, Orienteering, Cooking

Introduction: My name is Twana Towne Ret, I am a famous, talented, joyous, perfect, powerful, inquisitive, lovely person who loves writing and wants to share my knowledge and understanding with you.