2013 greeted the tech world with news of hacking attacks targeting top tech companies left, right, and center. Micro blogging platform Twitter first discovered traces of hacking attacks around January and soon after, other tech companies revealed that they have also been under siege of hacks and malware. Technology field leaders Apple, Microsoft, and Facebook have then subsequently admitted that they have also been victims of cyber attacks.
Because of the hacking extravaganza that happened, authorities have searched high and low for more information to shed light on what the purpose of the hacking attacks is. The leading theory is that the crooks are sniffing around for juicy tech innovations and other intellectual properties. Industrial espionage at its finest.
The Security Ledger has published some findings regarding the widespread attacks. Some of the more startling discoveries that are made point out that tech companies were not the only targets. While specific names were not put forward, it has announced that assortments of companies were targeted, from car companies to candy makers. As to the nature of the attacks, it has said that it “looks more like a fishing expedition than a narrowly focused operation.”
Another startling truth to have surfaced is that the attacks occurred due to vulnerabilities in Apple’s Mac OS. The Mac operating system is often lauded to be virus-free, in contrast with Microsoft’s malware-laden Windows operating system. With the discovery of the PintSized malware, the virus that is said to be responsible for the attacks, it is now revealed that Apple laptops are not invincible from hackers.
Finally, it was revealed that some websites called “watering holes” were used to spread the cyber infection. iPhoneDevSDK.com was named one of the watering holes used to further the spread of the malicious software. However, the most frightening discovery presented is that the attacks hit only some visitors. This means that the hackers have unprecedented control over its malware minions or at the very least have coded the malware so that it can attack specific targets that meet its criteria.
With some people already foreshadowing a cyber “9/11”, these hacking attacks are truly a matter of grave concern. Keep up to date with the latest news right here and tell us of your thoughts below.