What the hack?!

Brace yourself for some of the most bizarre
cyberattack incidents from the past.

Data stolen through a fish tank

Published on October 1, 2024.

A North American casino's fish tank was so high-tech that it could be remotely monitored, automatically adjust its temperature and salinity, and automate feedings. Hackers exploited a vulnerability in the thermometer to get a foothold in the network. Once security software was installed, it identified an anomalous data transfer from the fish tank to a remote server in Finland. This led to 10GB of data loss. 

Hacked road sign drops a movie spoiler

Published on October 1, 2024.

Let's face it. Nobody likes spoilers! Even more so when it's on a hacked road sign. That's exactly what happened when hackers gained unauthorized access to the remotely-programmed road sign in Castleberry Hill, Atlanta, and replaced traffic updates with movie spoilers. They wrote "Looper/Spoiler Alert/Bruce Willis Dies."

"Fashionable" dinosaurs on Vogue

Published on October 1, 2024.

In 2013, the Vogue UK's website splashed dinosaurs wearing hats across the screen. People could go to their website and type in the Konami code (a famous cheat code from video games): Up, Up, Down, Down, Left, Right, Left, Right, B, A. How the hacker gained unauthorized access was not disclosed. While the intent seemed to be about fun, it still serves as a reminder of how crazy internet security breaches can get!

Hackers crank up the tornado alarms

Published on October 1, 2024.

In 2017, the City of Dallas was jolted awake on a Friday night when hackers compromised its tornado emergency alert system, setting off more than 150 sirens for over 90 minutes! They apparently used a method called "Radio Replay". The emergency system could be compromised by outside radio equipment that replicates the tonal codes required to trigger the tornado alarms. At the time, there was no encryption to shield against the sounds of the imposter tones.

Free fuel after hackers crack the pump code

Published on October 1, 2024.

The plan relied on a “special remote” bought online that could hack a specific pump brand at certain French gas stations. Some gas station managers made things easier by failing to change the default pin code of their gas pumps. This oversight provided an opportunity for fraudsters to reset fuel prices and erase fill-up limits. About 120,000 liters of fuel was stolen from gas stations across Paris.

Hacker hijacks a contest to win a Porsche!

Published on October 1, 2024.

In the '90s, a radio station hosted a contest where the 102nd caller would win a sports car! A contestant (aka the hacker) did just that! He hacked and took over the phone lines, hijacking 25 phone systems while locking out other callers, all to ensure his triumph!  

Hackers crash a baby monitor

Published on October 1, 2024.

IOT-based attacks just got creepier! A hacker hijacked an Ohio family's baby monitoring system. The device was from a popular brand of baby monitors that featured remote monitoring. The hacker started screaming "Wake up baby!" The shocked parent rushed in to see that the hacker pointed the camera at them, throwing insults! Turns out the camera was a 3-year old model that needed a firmware update.

Favorite TV show leaked by hackers

Published on October 1, 2024.

Talk about spoilers! The Dark Overlord, a hacker group, hijacked a post-production company to leak some episodes of the popular TV show Orange Is The New Black. The post-production company had its security compromised due to weak security practices. While the hackers demanded a ransom, the popular streaming service did not meet their ransom requests.

Power plant rocked by Thunderstruck sound track

Published on October 1, 2024.

A computer worm was released in Iranian nuclear facilities. It was believed that the hacker tool Metasploit was used, and the hackers accessed the VPN. Apart from shutting down two of their facilities, the hackers also uploaded AC/DC's Thunderstruck to the system, which led to computers bizarrely playing the heavy metal track at full volume at random intervals.

Not a merry Christmas morning

Published on October 1, 2024.

In December 2014, Lizard Squad put gaming consoles on pause by implementing a DDoS attack on Xbox and PlayStation networks. Considering it was Christmas, and people would be gaming, this attack could've affected about 160 million gamers.

Hackers hit the jackpot in ATMs

Published on October 1, 2024.

In 2017, using the jackpotting technique, ATM machines in Germany was hacked by a malware called Cutlet Maker that was developed to enable ATMs to eject cash. The hackers managed to steal $1.5 million from ATMs in Germany. A message "Ho-ho-ho! Let's make some cutlets today!" with cartoon images of a chef and a smiling piece of meat were displayed.

Coffee machine brews a ransomware attack

Published on October 1, 2024.

A security researcher discovered a smart coffee machine could act as a Wi-Fi access point, so he exploited an unencrypted connection. He figured out the machine's firmware update procedures, reverse engineered, and hacked it. He also explored crafting a ransomware attack that made the device malfunction until a ransom was paid. While not intending to pose a real threat, the researcher revealed how a seemingly common appliance could be hacked.

1/12

Cybersecurity Masterclass

Dive into our exclusive Masterclasses featuring
renowned cybersecurity experts.

Tumbnail playbutoon
Watch now

Essential elements for devising a
cybersecurity strategy in 2025

Tumbnail playbutoon
Watch now

AI's impact on the cybersecurity
landscape: A conversation with Alex Sharpe

Survival of the
vigilant 

Get your game mode on for this rapid-fire
trivia and win a gift card of up to $500!* 

Rules:

With one minute on the clock, get as many answers right as you can on your first try for a chance to win a gift card of up to $500.*


Remember: You snooze, you lose.

Let's ace it!

Start the quiz
cloud img cloud img

Resource hub

Explore our set of resources offering best practices and strategies
to enhance your organization's cybersecurity.

  • Week 1
  • Week 2
  • Week 3
  • Week 4
  • Week 5
Adopting Zero Trust to safeguard against generative AI cyberthreats

Adopting Zero Trust to safeguard against generative AI cyberthreats

Download
The ten commandments of peripheral device security

The ten commandments of peripheral device security

Download
10 Firewall best practices for network security admins

10 Firewall best practices for network security admins

Download
Why your Enterprise needs a Security Information and Event Management (SIEM) Solution?

Why your Enterprise needs a Security Information and Event Management (SIEM) Solution?

Download
Privileged access management 101: A comprehensive guide to building a sound PAM strategy for your enterprise

Privileged access management 101: A comprehensive guide to building a sound PAM strategy for your enterprise

Download
Zero-day 101 Deciphering 0-day Attacks

Zero-day 101 Deciphering 0-day Attacks

Download
Rogues on the rise: Is your network secure enough?

Rogues on the rise: Is your network secure enough?

Download
How to stay ahead of cybercriminals using SIEM

How to stay ahead of cybercriminals using SIEM

Download
A 10-point checklist for comprehensive data protection

A 10-point checklist for comprehensive data protection

Download
Get Cyber insurance ready with ManageEngine PAM360

Get Cyber insurance ready with ManageEngine PAM360

Download
Endpoint protection in the digital age: A crowdsourced playbook on fortifying your enterprise

Endpoint protection in the digital age: A crowdsourced playbook on fortifying your enterprise

Download
Using indicators to deal with security attacks

Using indicators to deal with security attacks

Download
Automating joiners, movers, and leavers life cycle management using a no-code solution

Automating joiners, movers, and leavers life cycle management using a no-code solution

Download
An IT admin's guide to provileged account governance

An IT admin's guide to provileged account governance

Download
The endpoint endgame: Essential secuirty practices you need to thrive in a remote world

The endpoint endgame: Essential secuirty practices you need to thrive in a remote world

Download
Getting the best out of your SIEM: The handbook for security analysts

Getting the best out of your SIEM: The handbook for security analysts

Download
New
A guide to master CISA's MFA best practices

A guide to master CISA's MFA best practices

Download
New
Breaking the security silos

Breaking the security silos

Download
New
8 best practices for device control in 2024

8 best practices for device control in 2024

Download
New
Threat intelligence and the SIEM advantage

Threat intelligence and the SIEM advantage

Download
close-icon
close-icon

Hey there!

The Cybersecurity Awareness Month 2024 campign has ended.
See you next year with lot more to learn!

0%