hey guys welcome to another exciting video by simply learn in this video we bring you the top 10 computer hacks of all time but before we begin if you're new here and haven't subscribed already make sure to hit the subscribe button and the bell icon for interesting tech videos every day let's see what we have at number 10 from april 27 2007 estonia the european country faced a series of cyber attacks that lasted for weeks this happened when the estonian government decided to move the bronze soldier from talon center to a less prominent military cemetery located on the city's outskirts unprecedented levels of internet traffic took down estonian banks online services media outlets broadcasters and government bodies botnets sent massive waves of spam and vast amounts of automated online requests according to researchers the public faced ddos attacks there were conflicts to edit the english language version of the bronze soldiers wikipedia page as well although there is no confirmation russia is believed to be behind these cyber attacks that largely crippled the estonian society let's now move on to the next attack on december 23 2015 several parts of ukraine witnessed a power outage and this was not a typical blackout it was indeed the result of a cyber attack information systems of three energy distribution companies in ukraine were compromised it is the first known victorious cyber attack on apar grid it is said that here hackers sent out phishing emails to the power companies 30 substations were switched off and about 230 000 people were left in the dark for about one to six hours us investigators believed that russia-based hackers were responsible for this experts have warned that other countries could also be vulnerable to such attacks let's see what we have at number eight in the year 1999 a cyber attack cost a 21 day shutdown of nasa computers unbelievable isn't it the hacker was none other than the then 15 year old jonathan james he first penetrated u. s department of defense division's computers and installed a back door on its servers this allowed him to intercept more than a thousand government emails including the ones containing usernames and passwords this helped james steal a piece of nasa software and crack the nasa computers that support the international space station which cost the space exploration agencies forty one thousand dollars as systems were shut down for three weeks he was the first person to carry out a computer hack against the american space agency let's now move on to the next attack in late november 2014 there was a leak of confidential data from the film studio of sony pictures information about sony pictures employees their emails copies of the then unreleased sony films future propositions and other crucial data were leaked this cyber attack was carried out by a hacker group named guardians of peace so what did the hackers want well they demanded that sony withdraw its then upcoming movie the interview this movie was a comedy story line to assassinate the north korean leader kim jong-un sony then decided to cancel the film's theatrical release due to the threats at cinema screening the movie it is indeed hard to trace the roots of a cyber attack in this case after evaluation the u. s intelligence officials arrived at the theory that the attack was in a way related to the government of north korea however north korea had denied the same moving on to our number six in december 2006 tjx the u.
s retailer company identified that 45. 6 million debit and credit card details were stolen this happened from one of its systems over 18 months by an unknown number of intruders it was one of the first largest ever cyber attacks involving the loss of personal data as a result banks in the affected regions had to reissue and block thousands of payment cards a group of hackers did this albert gonzalez being the mastermind the group was from miami the place where the tjx heist was believed to have originated reports said that the tjx data breach occurred because of weak web encryption at two of its marshall stores in miami next moving on to our top five let us see what we have at number five the year 2010 witnessed the discovery of the deadly computer worm stuxnet this malware's motive was unlike any other usual cyber attacks it aimed at destructing the equipment the computers controlled stuxnet came with the deadly purpose of damaging iran's nuclear infrastructure it infected more than 200 000 computers including 14 industrial sites and a uranium enrichment plant in iran stuxnet initially spread via microsoft windows and targeted siemens industrial control systems although it was discovered only in 2010 it is believed to have been silently sabotaging iran's nuclear facilities it was one of the first discovered malware that was capable of hampering hardware systems it largely damaged the centrifuge of the iranian reactors this is believed to be a cyber weapon created by the u. s and the israeli intelligence although there is no documented evidence or acceptance by either of the countries for the same moving on to number four in the year 2014 home depot was the victim of one of the deadliest cyber attacks 56 million payment cards were compromised along with 53 million customer email addresses stolen this security breach happened from april to september 2014.