Cyber Threats: 4 Cases and the Secrets of Defense

2025/ 11/02

With the rise of digitalization, companies and individuals face increasing cyber threats that can cause severe financial and data losses. Data breaches, ransomware, and other types of attacks are becoming more sophisticated, with attackers rapidly adapting to technological advancements. The damage caused can be extremely severe, as demonstrated by the following four real-life examples. But what can we do to defend against these attacks? In this article, we share some practical defense methods that can help minimize the risks.

Snowflake

Snowflake, a leading cloud-based data platform, suffered a major security breach in May 2024. The data breach affected over 100 clients, including major corporations like AT&T, Ticketmaster, and Santander Bank.

The hackers executed the attack by exploiting the compromised credentials of a Snowflake employee's account. This unauthorized access led to a large amount of sensitive data being leaked. Billions of call records were stolen from AT&T, along with personal information from Ticketmaster and Santander Bank customers. The attackers demanded ransoms ranging from $300,000 to $5 million from the affected companies to avoid public disclosure of the stolen data.
The incident not only resulted in significant financial losses but also highlighted critical security vulnerabilities, particularly the lack of multi-factor authentication (MFA) and inadequate credential management among Snowflake's clientele.

Transport for London (TfL)

In September 2024, Transport for London (TfL) became the target of a sophisticated cyberattack, causing significant service disruptions. The most affected were disabled passengers who relied on TfL's Dial-A-Ride service, highlighting how cyberattacks can severely impact daily life. Approximately 5,000 customer records were compromised, including sensitive information such as addresses and banking details.

Suspecting a ransomware attack, TfL's IT security teams acted swiftly, shutting down multiple systems and restricting access to mitigate the damage. However, this led to major operational disruptions and financial losses. According to TfL, the incident cost the organization a total of £30 million, with £5 million spent in the last three months on recovery efforts, investigations, and enhanced cybersecurity measures.

WordPress

One common tactic employed by hackers involves infiltrating WordPress websites and installing malicious plugins. These plugins display pop-ups about fake software updates or errors and advertisements that redirect visitors to compromised websites. According to researchers, attackers use brute-force attacks, phishing techniques, and information-stealing malware to obtain website administrator credentials. The seemingly harmless plugins are designed to avoid suspicion while containing hidden malicious scripts.

During the ClearFake campaign, which has been active since 2023, attackers used fake banner ads to trick browser users into installing updates. These ads on compromised websites actually distributed information-stealing malware.

In 2024, a new campaign known as ClickFix emerged, employing methods similar to ClearFake. However, this time, the supposed fixes appeared in the form of software error messages. These "fixes" downloaded and installed information-stealing malware by executing PowerShell scripts.
To date, over 6,000 WordPress sites have been attacked as part of the ClearFake and ClickFix campaigns.

CrowdStrike / Microsoft

In July 2024, a faulty update to the CrowdStrike Falcon Sensor software caused significant disruptions for Microsoft Windows users worldwide.

Users across the globe encountered the infamous "Blue Screen of Death." Approximately 8.5 million systems crashed worldwide, affecting several critical sectors, including aviation, banking, healthcare, and manufacturing. Even TV stations, grocery stores, and gas stations experienced operational disruptions.

George Kurtz, CrowdStrike's CEO, immediately issued an apology and clarified that the incident was the result of a software error. Although a fix was quickly deployed, many organizations faced extended recovery periods, with some systems requiring manual intervention to restore full functionality.

Although this was not a cyberattack, the incident underscored the far-reaching impacts of vulnerabilities in interconnected digital systems.

Defense Strategies

Today, cybercriminals are employing increasingly sophisticated techniques, making it nearly impossible for any business to feel completely secure. However, with proper preparedness and well-planned defense strategies, attacks can be successfully averted, or the resulting damage can be effectively minimized. Here are some practical tips for fortifying yourself against various cyber threats:

  • Stay Informed: Keep up to date not only on the latest software vulnerabilities but also on emerging threats.
  • Version and Security Updates: Ensure that systems are properly and promptly updated.
  • Disaster Recovery Plan: Prepare a recovery plan in case your systems become the target of a cyberattack.
  • Multi-Factor Authentication (MFA): Enable additional security layers for all available services.
  • Data Backup: Regularly back up critical data and store it in separate, secure locations.
  • Access Control: Manage who has access to what level of IT systems.
  • Security Software: Install and maintain reliable antivirus and firewall solutions.
  • Security Awareness Training: Educate employees on recognizing suspicious emails and links.
  • Regular Security Audits: Periodically inspect IT infrastructure to identify weaknesses and vulnerabilities.
  • External Device Control: Limit the connection of unknown USB devices and peripherals.
  • Network Security: Protect networks with strong encryption and secure Wi-Fi settings.

Are you sure your systems are adequately protected? Take advantage of our Vulnerability Assessment service to identify your system's weaknesses!

Source: CM-Alliance, NKI