{"id":1444,"date":"2021-10-15T15:30:00","date_gmt":"2021-10-15T15:30:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/2021-cyberattack-tales-of-terror\/"},"modified":"2023-05-16T20:24:54","modified_gmt":"2023-05-16T20:24:54","slug":"2021-cyberattack-tales-of-terror","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/2021-cyberattack-tales-of-terror\/","title":{"rendered":"2021 cyberattack tales of terror"},"content":{"rendered":"<p>The second of our spine-tingling October Cybersecurity Awareness Month posts.<\/p>\n<p>We started our Cybersecurity Awareness Month blog posts with rather <a href=\"https:\/\/www.pax8.com\/blog\/spooky-cybersecurity-stats\/\" target=\"_blank\" rel=\"noopener\">scary cybersecurity stats<\/a>, and we\u2019re continuing with some truly frightening tales of hacking and ransomware attacks that were successfully undertaken on some major targets. We wish these were just urban legends, but these are bona fide horror stories that have far-reaching impacts well beyond the millions of dollars paid to attackers.<\/p>\n<h1>Microsoft Exchange Servers HAFNIUM attack<\/h1>\n<h2>March 2, 2021<\/h2>\n<p>This bone-chilling attack has been characterized as a &#8220;global cybersecurity crisis&#8221; due to its level of focus, method of exploit, and potential reach. The HAFNIUM attack leveraged previously unknown exploits to target\u00a0vulnerabilities in Microsoft\u2019s on-premises Exchange Server software. It utilized multiple zero-day exploits to launch a targeted attack aimed at on-premises versions of Microsoft Exchange Server. This enabled HAFNIUM operators to deploy web shells on any compromised server that would potentially allow attackers to steal data and perform additional malicious actions leading to further compromise.<\/p>\n<p>Microsoft was swift in identifying the attack and in releasing a patch for the vulnerability, but the sheer number of potentially affected servers and the possible lingering effects made this an especially scary and challenging attack to deal with for CSPs and MSPs alike. Read the <a href=\"https:\/\/www.pax8.com\/blog\/alert-hafnium\/\" target=\"_blank\" rel=\"noopener\">Pax8 response<\/a>.<\/p>\n<h1>Kaseya ransomware attack<\/h1>\n<h2>July 2, 2021<\/h2>\n<p>This ransomware attack was especially terrifying because of its cascading effect. Attackers were able to exploit an authentication bypass\u00a0vulnerability\u00a0within one of Kaseya\u2019s remote monitoring and management\u00a0software packages. Through this, they were able to distribute a malicious payload through hosts managed by the software, which exposed MSPs and their clients to downstream ransomware attacks.<\/p>\n<p>The effect reportedly caused widespread downtime for more than 1,000 companies, which included one Swedish supermarket chain that had to close down all 800 stores for almost a week leaving some in small villages without any food shopping options. The chain didn\u2019t pay any ransom but rebuilt their systems from scratch after waiting for an update from Kaseya.<\/p>\n<p>Read the<a href=\"https:\/\/www.pax8.com\/blog\/kaseya-ransomware\/\" target=\"_blank\" rel=\"noopener\"> Pax8 security post<\/a> regarding this attack.<\/p>\n<h1>The Colonial Pipeline ransomware attack<\/h1>\n<h2>May 7, 2021<\/h2>\n<p>This successful ransomware attack was one that literally created a panic in the streets, or at least at the pumps. Using a stolen password on a legacy Virtual Private Network (VPN) system that lacked multifactor authentication, Eastern European hackers were able to encrypt the computers used to manage Colonial\u2019s pipeline system. The company was forced to shut down its entire distribution pipeline, which threatened gasoline and jet fuel supplies for the entire U.S. east coast.<\/p>\n<p>Colonial paid the hackers 75 bitcoin (nearly $5 million at the time), of which the U.S. government was able to recover 60 bitcoin. The financial impact of this attack is greatly overshadowed by the potentially devastating impact it could have had on our ability to travel and on our economy as a whole. Read the details on the <a href=\"https:\/\/www.msspalert.com\/cybersecurity-breaches-and-attacks\/ransomware\/colonial-pipeline-investigation\/\" target=\"_blank\" rel=\"noopener\">MSSP Alert<\/a>.<\/p>\n<h1>Attack on Oldsmar, Florida&#8217;s water supply<\/h1>\n<h2>December 20, 2020 \u2013 February 16, 2021<\/h2>\n<p>The prospect of a cyberattack on our public infrastructure should scare you to your soul, especially understanding why this attack was even discovered. An ongoing deeper-level attack was discovered because of a separate incident on February 5, 2021 where a hacker remotely accessed the water treatment plant\u2019s system and increased sodium hydroxide (more commonly known as lye) levels from 100 parts per million to 11,100 parts per million. The change was immediately detected by a plant operator, who changed the levels back before the attack had any impact on the system.<\/p>\n<p>However, during the resulting investigation, an IT security firm discovered malicious code in the plant\u2019s computers that had been there since December 20, 2020 when attackers had gained access using a watering hole attack. An Oldsmar city computer reportedly visited a website where malicious code had been inserted into the footer of a WordPress-based site belonging to an actual Florida water infrastructure construction company. Once the watering hole attack code was inserted, the attackers began collecting information on visitors to this legitimate site. Check out the <a href=\"https:\/\/www.abcactionnews.com\/news\/region-pinellas\/report-oldsmar-water-hack-came-after-city-computer-visited-compromised-website\" target=\"_blank\" rel=\"noopener\">local news coverage<\/a> on the attacks.<\/p>\n<h1>JBS Meat Processor ransomware attack<\/h1>\n<h2>February \u2013 May 2021<\/h2>\n<p>The nightmare-inducing aspect of this attack isn\u2019t the whopping $11 million in cryptocurrency the company paid to recover their data, it\u2019s the catastrophic effect it could have had on the world\u2019s food supply. JBS is the world\u2019s largest meat supplier, with operations in 28 U.S. states, Canada, Puerto Rico, Mexico, Europe, Australia, and New Zealand.<\/p>\n<p>This attack was carefully coordinated and started with an initial reconnaissance phase in February. Then from March through the end of May, attackers launched multiple data exfiltration events, ultimately accessing a massive 5 TB of data. The attack was finally revealed on June 1 when the threat actors encrypted the JBS environment and published their ransom demands. The initial intrusion occurred in February by a third-party believed to be using leaked login credentials. Even scarier still, it\u2019s still not known how those credentials were leaked or by whom. Get the details on the <a href=\"https:\/\/www.msspalert.com\/cybersecurity-breaches-and-attacks\/ransomware\/colonial-pipeline-investigation\/\" target=\"_blank\" rel=\"noopener\">MSSP Alert<\/a>.<\/p>\n<h1>The scariest attack that didn\u2019t succeed<\/h1>\n<h2>August 2021<\/h2>\n<p>As we were compiling this post, Microsoft announced on October 11<sup>th<\/sup>, that, in August of this year, it thwarted a mind-boggling distributed denial of service (DDos) attack against its Azure cloud service. The attack traffic came from a botnet comprised of approximately 70,000 bots located in multiple countries in the Asia-Pacific region and the United States. A series of very short-lived bursts were sent over approximately a ten-minute period, with each ramping up in seconds to terabit volumes. In total, three main peaks were registered, the first at 2.4 Tbps, the second at 0.55 Tbps, and the third at 1.7 Tbps \u2014 all of which were mitigated by Azure\u2019s built-in security system. This was the largest DDoS attack the company has faced to date and is the second-largest DDoS attack ever recorded. Read <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/business-as-usual-for-azure-customers-despite-24-tbps-ddos-attack\/\" target=\"_blank\" rel=\"noopener\">Microsoft\u2019s post<\/a> on the Azure blog.<\/p>\n<h1>Don\u2019t be Scared. Be Prepared.<\/h1>\n<p>If you take nothing else from these chilling tales, we hope you learn the lesson that victims in horror flicks never do \u2014 never wander around unprotected and alone, especially in cyberspace. Make sure your clients are well-protected and properly trained, so a poor security strategy or bad habits don\u2019t come back to haunt them. Our security vendors have the solutions you need to continually protect your clients, and Pax8 is always here to help shine a light into the shadows and answer any questions you may have.<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/www.pax8.com\/explore\/cybersecurity\">Explore security resources<\/a><br \/>\n<a href=\"https:\/\/www.pax8.com\/blog\/contact-pax8\">Schedule a call<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Among the ongoing rise in stories of hacked data, ransomware attacks, and other malicious cybercrimes, we\u2019ve compiled the five scariest successful attacks AND one that was foiled in spectacular faction.<\/p>\n","protected":false},"author":141,"featured_media":297,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5],"tags":[],"class_list":["post-1444","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>2021 cyberattack tales of terror - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"Among the ongoing rise in stories of hacked data, ransomware attacks, and other malicious cybercrimes, we\u2019ve compiled the five scariest successful attacks AND one that was foiled in spectacular faction.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/2021-cyberattack-tales-of-terror\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2021 cyberattack tales of terror - Pax8 Blog\" \/>\n<meta property=\"og:description\" content=\"Among the ongoing rise in stories of hacked data, ransomware attacks, and other malicious cybercrimes, we\u2019ve compiled the five scariest successful attacks AND one that was foiled in spectacular faction.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/2021-cyberattack-tales-of-terror\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-15T15:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T20:24:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Spooky-Stats-2_Blog-Image-01.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1187\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/2021-cyberattack-tales-of-terror\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/2021-cyberattack-tales-of-terror\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"2021 cyberattack tales of terror\",\"datePublished\":\"2021-10-15T15:30:00+00:00\",\"dateModified\":\"2023-05-16T20:24:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/2021-cyberattack-tales-of-terror\\\/\"},\"wordCount\":1075,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/2021-cyberattack-tales-of-terror\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Spooky-Stats-2_Blog-Image-01.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/2021-cyberattack-tales-of-terror\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/2021-cyberattack-tales-of-terror\\\/\",\"name\":\"2021 cyberattack tales of terror - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/2021-cyberattack-tales-of-terror\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/2021-cyberattack-tales-of-terror\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Spooky-Stats-2_Blog-Image-01.jpg\",\"datePublished\":\"2021-10-15T15:30:00+00:00\",\"dateModified\":\"2023-05-16T20:24:54+00:00\",\"description\":\"Among the ongoing rise in stories of hacked data, ransomware attacks, and other malicious cybercrimes, we\u2019ve compiled the five scariest successful attacks AND one that was foiled in spectacular faction.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/2021-cyberattack-tales-of-terror\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/2021-cyberattack-tales-of-terror\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/2021-cyberattack-tales-of-terror\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Spooky-Stats-2_Blog-Image-01.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Spooky-Stats-2_Blog-Image-01.jpg\",\"width\":2000,\"height\":1187,\"caption\":\"Security Stories to Tell in the Dark\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/2021-cyberattack-tales-of-terror\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2021 cyberattack tales of terror\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2021 cyberattack tales of terror - Pax8 Blog","description":"Among the ongoing rise in stories of hacked data, ransomware attacks, and other malicious cybercrimes, we\u2019ve compiled the five scariest successful attacks AND one that was foiled in spectacular faction.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/2021-cyberattack-tales-of-terror\/","og_locale":"en_US","og_type":"article","og_title":"2021 cyberattack tales of terror - Pax8 Blog","og_description":"Among the ongoing rise in stories of hacked data, ransomware attacks, and other malicious cybercrimes, we\u2019ve compiled the five scariest successful attacks AND one that was foiled in spectacular faction.","og_url":"https:\/\/www.pax8.com\/blog\/2021-cyberattack-tales-of-terror\/","og_site_name":"Pax8 Blog","article_published_time":"2021-10-15T15:30:00+00:00","article_modified_time":"2023-05-16T20:24:54+00:00","og_image":[{"width":2000,"height":1187,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Spooky-Stats-2_Blog-Image-01.jpg","type":"image\/jpeg"}],"author":"narnold","twitter_card":"summary_large_image","twitter_misc":{"Written by":"narnold","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/2021-cyberattack-tales-of-terror\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/2021-cyberattack-tales-of-terror\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"2021 cyberattack tales of terror","datePublished":"2021-10-15T15:30:00+00:00","dateModified":"2023-05-16T20:24:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/2021-cyberattack-tales-of-terror\/"},"wordCount":1075,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/2021-cyberattack-tales-of-terror\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Spooky-Stats-2_Blog-Image-01.jpg","articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/2021-cyberattack-tales-of-terror\/","url":"https:\/\/www.pax8.com\/blog\/2021-cyberattack-tales-of-terror\/","name":"2021 cyberattack tales of terror - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/2021-cyberattack-tales-of-terror\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/2021-cyberattack-tales-of-terror\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Spooky-Stats-2_Blog-Image-01.jpg","datePublished":"2021-10-15T15:30:00+00:00","dateModified":"2023-05-16T20:24:54+00:00","description":"Among the ongoing rise in stories of hacked data, ransomware attacks, and other malicious cybercrimes, we\u2019ve compiled the five scariest successful attacks AND one that was foiled in spectacular faction.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/2021-cyberattack-tales-of-terror\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/2021-cyberattack-tales-of-terror\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/2021-cyberattack-tales-of-terror\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Spooky-Stats-2_Blog-Image-01.jpg","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Spooky-Stats-2_Blog-Image-01.jpg","width":2000,"height":1187,"caption":"Security Stories to Tell in the Dark"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/2021-cyberattack-tales-of-terror\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"2021 cyberattack tales of terror"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1444"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1444\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/297"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}