Back

The Top 10 Biggest Cyberattacks of 2022

As we transition into the new year its essential to be aware of the cyberattacks that have taken place in the past 12 months And as technology evol...

7 min read
Published on Jan 3, 2023
biggest-cyberattacks-2022

As we transition into the new year, it’s essential to be aware of the cyberattacks that have taken place in the past 12 months. And as technology evolves, so must the need for increased cybersecurity measures.

Here are the most significant cyberattacks of 2022 and companies’ actions to protect data from future threats.

1. Rackspace

On December 06, 2022, Rackspace Technology® reported a ransomware incident that affected their Hosted Exchange environment. It led to service disruptions for some of their customers.

The company quickly responded by assembling an internal security team and contracting a leading cyber defense firm. They investigate the incident and limit the impact of potential loss of data or revenue and any incremental costs.

Rackspace has taken proactive measures to isolate and contain the incident to protect its customers. However, the investigation believes the ransomware was in isolation from other products and that the other products remain operational.

Rackspace posted a cautionary banner updated live via its website. It is actively taking additional security measures to monitor any suspicious communication. In addition, they are providing consumer guidance for migrating away from the potentially impacted services. It also includes helping limit the impact of customers’ operations.

2. Okta, and Okta Again

LAPSUS$

On March 22, 2022, screenshots taken from an Okta third-party customer support engineer were posted online by LAPSUS$. As a result, Okta released a statement explaining the situation and reassuring that the Okta service was still secure. They stated that customers did not need to take any corrective actions.

Sitel is a sub-processor of Okta’s workforce who helps with its customer support organization. Following an unsuccessful attempt of a new password addition to one of Sitel’s engineers’ accounts, out of caution, it got reset, and Sitel engaged with a forensic firm to investigate further.

To understand the potential impact of the security incident, Okta analyzed the actions of Sitel employees on the SuperUser application for five days. As a result, they determined that about 2.5% of customers had their Okta tenant accessed by Sitel.

To be transparent, the customers will receive a report showing Sitel’s actions on their Okta tenant during that period so they can assess the situation themselves.

GitHub Source Code

Okta recently suffered a security breach in which someone stole their source code from their GitHub repositories. Okta’s chief security officer, David Bradbury, sent out an email notification to their security contacts revealing what had happened. The attacker didn’t gain access to any customer data or services. Users of Okta’s different services were unaffected by the incident.

3. Crypto

Crypto, a cryptocurrency exchange, experienced a hack earlier this year on January 17, 2022. It resulted in the unauthorized withdrawal of bitcoin and Ether worth around $35 million (originally estimated to be $15 million).

To investigate and address the issue, Crypto suspended withdrawals for 14 hours to address the issue. Overall no customers experienced a loss of funds as Crypto prevented almost all unauthorized withdrawals. All other cases got reimbursed.

They also implemented their Worldwide Account Protection Program (WAPP), which promises to restore funds up to $250,000 for qualifying users.

4. Small Change Next to the $620 Million Stolen From Axie Infinity

Chainalysis, a crypto analytics firm, recently helped the U.S. government recover about $30 million  of the stolen funds taken from Axie Infinity, an online video game. The entity responsible for the theft is North Korean hackers known as Lazarus Group, linked to multiple crypto thefts in recent years.

Thanks to Chainalysis and law enforcement officials, they were able to retrieve some of these stolen funds, which marks the first time that the U.S. ever seized cryptocurrency stolen by North Korean hackers.

The total amount stolen was over $600 million, but with their help, they recovered at least some of it while going down in the history books.

5. Russia’s Invasion of Ukraine and the IT Army

A group of hackers in Ukraine has been disrupting Russian web services in retaliation for the Russian invasion of their country. The group, called “IT Army of Ukraine,” has successfully taken down the websites of the Kremlin, the Duma, state-owned media services, several banks, and the energy giant Gazprom.

Russia has attempted to stop the cyberattacks by filtering access to certain websites, but this has only caused more disruption.

Biggest Cyberattacks of 20226. Conti Ransomware Leak

A Ukrainian security researcher leaked damaging data, including source code and over 1000,000 internal messages about the Conti ransomware operation. The leak happened just after they sided with Russia over the invasion of Ukraine on February 27, 2022.

The researcher leaked the messages associated with a log server for the Jabber communication system used by the hacker group. The data contains information about the hackers’ activities, including:

  • Previously unreported victims
  • Private data leak URLs
  • Bitcoin addresses
  • Discussions about their operations

These leaked messages seriously undermined the operation while giving researchers and law enforcement crucial information about their internal workings.

7. Montenegro Cyberattacks: Russia to Blame

Experts from several countries rushed to investigate and restore the Montenegro government’s computer system after coordinated cyberattacks starting around August 20, 2022, leaving the state’s infrastructure at risk. The attack was carried out partly by a Russian-speaking ransomware gang known as Cuba ransomware and called Zerodate.

Some suspect the Kremlin or even state intelligence services were behind it. And it could be due to Montenegro joining NATO despite Russian opposition and taking part in Western sanctions against Moscow regarding Ukraine, which led Russia to label them an enemy.

8. Log4j

Log4j is a standardized Java utility and has been around for 20 years. However, in December 2021, a critical vulnerability called Log4Shell was found, which allowed unauthenticated and untrained threat actors to gain control over applications, resulting in costly breaches.

Despite numerous attempts to fix the problem, many organizations remain vulnerable to the risk of Log4Shell, with 2.5% of assets remaining exposed as of October 2022. Additionally, 29% of assets showed recurrences despite previously achieving complete remediation.

9. Honorable Mention: The Year of LAPSUS$

LAPSUS$ first made headlines in December 2021 with Brazil’s Ministry of Health attack and gained global attention the following March for large-scale cyberattacks on companies like Okta, Microsoft, Samsung, and Vodafone.

Following this attention in April 2022, authorities arrested and charged two teenagers under 18 with connections to LAPSUS$. Despite getting served with several offenses, activity continued, and the hacker group released hacked source code for apps belonging to major companies such as Facebook and DHL shortly after.

While it is uncertain if LAPSUS$ was also behind an Uber data breach and the Rockstar Games hack, some are concerned about the lack of cybersecurity protocols from these big firms and those young individuals can target these massive corporations.

10. Twitter: 5.4 Million User Accounts Stolen From a Social Engineering Attack

On August 5, 2022, Twitter revealed that a hacker going by the alias “devil” exploited a zero-day bug to link personal identifiers such as phone numbers and emails to user accounts on the social media platform.

The hacker took advantage of the flaw and released a significantly large dataset for $30,000 on online forums. The bug became known in June 2021 and affected over 5 million users.

As a result, Twitter quickly contacted account owners impacted by the problem directly and advised users to use two-factor authentication to protect against unauthorized logins.

Final Thoughts

As we move into 2023, we must be aware of the most critical cyberattacks of the previous year and what we can learn from them. Rackspace, Okta, and Crypto.com were all significant targets in 2022, and each one offers lessons for businesses of all sizes.

The Axie Infinity hack was one of the largest ever, and Russia’s involvement in the Montenegro cyberattacks shows that no country is immune from these threats. In addition, the Log4j leak highlights the importance of keeping all software up to date, and the Twitter hack demonstrates the power of social engineering attacks.

While it’s important to stay informed about these events, it’s also essential to protect yourself before something happens.

Don’t make the hacked news in 2023! Agile IT is here to help — we specialize in providing cybersecurity in Microsoft 365 and Azure, so don’t wait until it’s too late.

Related Posts

Screen Capture Protection in Windows 365

How to Enable Screen Capture Protection in Windows 365 for Enhanced Security

Learn how to enable and use screen capture protection in Windows 365 to secure sensitive information and prevent unauthorized captures, enhancing your organization's data security.

Jan 21, 2025
7 min read
Office 365 Collaboration Tools

Office 365 Collaboration Tools: Are They Right for Your Organization?

Explore how Office 365's collaboration tools can enhance your organization's productivity and security.

Jan 12, 2025
6 min read
NIST 800 171 vs NIST 800 53

NSA Cybersecurity Collaboration: No-Cost Services Available to DoD Contractors

Learn how NSA cybersecurity collaboration provides no-cost services to DoD contractors, helping enhance security and compliance with advanced cyber protections.

Jan 10, 2025
6 min read
When is a New CMMC Assessment Needed

Understanding When and Why You Need a New CMMC Assessment

Learn when to schedule a new CMMC assessment, what triggers reassessments, and how changes in scope, contracts, or compliance impact your certification process.

Jan 6, 2025
9 min read
How Does VDI Solve the CU./I and CMMC Conundrum?

How Does VDI Solve the CUI and CMMC Conundrum?

Explore how VDI for CUI helps businesses meet compliance requirements, ensuring secure data access while simplifying CMMC certification.

Dec 30, 2024
9 min read
Disaster Recovery Plan Enough

Is your disaster recovery plan enough?

Strengthen your Office 365 disaster recovery plan with granular backup, retention policies, and solutions to prevent data loss.

Dec 18, 2024
7 min read

Ready to Defend and Secure Your Data
So Your Business Can Thrive?

Fill out the form to see how we can protect your data and help your business grow.

Loading...
Secure. Defend. Thrive.

Let's start a conversation

Discover more about Agile IT's range of services by reaching out.

Don't want to wait for us to get back to you?

Schedule a Free Consultation

Location

Agile IT Headquarters
4660 La Jolla Village Drive #100
San Diego, CA 92122

Secure. Defend. Thrive.

Don't want to wait for us to get back to you?

Discover more about Agile IT's range of services by reaching out

Schedule a Free Consultation