The 1988-2017 Global cyber-warfare incident records index

The attackers'  plans
A cyber-attack is any type of offensive maneuver employed by nation-states, individuals, groups, or organizations that targets computer information systems.

They try to take over online devices and either hack, zombiefyed, ransom lock or otherwise take them over. Zombiefyed stuff can also be used to spew erroneous messages on line to swamp out and collapse sites and ISPs.

The October 2016 denile of service (DDOS) attack was directed against a major internet host: New Hampshire-based Dyn Inc. badly disrupting traffic to and from major internet services including Twitter, Spotify and Amazon.

National modus operandi

 * 1) Russia- destroy all on-line stuff.
 * 2) USA- destroy military and corporate on-line stuff.
 * 3) Israel- Specific targets such as a airbase or factory.
 * 4) Germany- Specific targets such as a airbase or factory.
 * 5) Mexico- Specific targets such as a airbase or factory.
 * 6) Canada- Specific targets such as a airbase or factory.
 * 7) Australia- Specific targets such as a airbase or factory.
 * 8) N.Z.- Specific targets such as a airbase or factory.
 * 9) Ukraine- Specific targets such as a airbase or factory.
 * 10) Iran- Specific targets such as a airbase or factory.
 * 11) Turkey- Specific targets such as a airbase or factory.
 * 12) DPRK- Specific targets such as a airbase or factory.
 * 13) UK- Specific targets such as a airbase or factory and spying in general.
 * 14) France- Specific targets such as a airbase or factory and spying in general.
 * 15) Italy- Specific targets such as a airbase or factory and spying in general.
 * 16) China- paralyses all of E-space with ddos attacks and steels corporate secrets. Theory holds that all that a Chines and Hong Kong web-cam sees, when swiched on, also gose to the Chinese secret service to be drained of any corporate secrets it films!
 * 17) Organised crime- Ransomwere, steeling data, virusing, DDOS attacks, zombifying computers, locking computers, destroying computers and finding stuff to use for blackmailing.

November 2, 1988 Morris worm
The Morris worm or Internet worm of November 2, 1988 was one of the first computer worms distributed via the Internet. It was the first to gain significant mainstream media attention. It also resulted in the first felony conviction in the US under the 1986 Computer Fraud and Abuse Act. It was written by a graduate student at Cornell University, Robert Tappan Morris, and launched on November 2, 1988 from the computer systems of the Massachusetts Institute of Technology.

1989 AIDS trojan horse virus attack
Not to be confused with the human, cat and\or monkey AIDS virus.

AIDS, also known as Aids Info Disk or PC Cyborg Trojan, is a trojan horse that replaces the AUTOEXEC.BAT file, which would then be used by AIDS to count the number of times the computer has booted. Once this boot count reaches 90, AIDS hides directories and encrypts the names of all files on drive C: (rendering the system unusable), at which time the user is asked to 'renew the license' and contact PC Cyborg Corporation for payment (which would involve sending 189 US$ to a post office box in Panama). There exists more than one version of AIDS, and at least one version does not wait to munge drive C:, but will hide directories and encrypt file names upon the first boot after AIDS is installed

1990 AIDS II computer virus

 * Not to be confused with the human, cat, dog and\or monkey AIDS virus.

AIDS II is a computer virus written in Turbo Pascal 3.01a which overwrites COM files. AIDS is the first virus known to exploit the MS-DOS "corresponding file" vulnerability. In MS-DOS, if both foo.com and foo.exe exist, then foo.com will always be executed first. Thus, by creating infected com files, AIDS code will always be executed before the intended exe code.

Early SQL injections
The first public discussions of SQL injection started appearing around 1998; for example, a 1998 article in Phrack Magazine.

March 26, 1999 Melissa virus
Around March 26, 1999 Melissa was put in the wild by David L. Smith of Aberdeen Township, New Jersey. (The virus itself was credited to Kwyjibo, who was shown to be macrovirus writers VicodinES and ALT-F11 by comparing MS Word documents with the same globally unique identifier—this method was also used to trace the virus back to Smith.) On December 10, 1999 Smith pleaded guilty and was sentenced to 10 years, serving 20 months, and was fined US $5,000. The arrest was the result of a collaborative effort involving (amongst others) the FBI, the New Jersey State Police, Monmouth Internet and a Swedish computer scientist. David L. Smith was accused of causing $80 million worth of damages by disrupting personal computers and computer networks in business and government.

5th of May 2000 ILOVEYOU virus
ILOVEYOU, sometimes referred to as Love Bug or Love Letter, was a computer worm that attacked tens of millions of Windows personal computers on and after 5 May 2000 local time in the Philippines when it started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.vbs". The latter file extension (in this case, 'VBS' – a type of interpreted file) was most often hidden by default on Windows computers of the time, leading unwitting users to think it was a normal text file. Opening the attachment activated the Visual Basic script. The worm did damage on the local machine, overwriting random types of files (including Office files, image files, and audio files; however after overwriting MP3 files the virus would hide the file), and sent a copy of itself to all addresses in the Windows Address Book used by Microsoft Outlook. In contrast, the Melissa virus only sent copies to the first 500 contacts. This made it spread much faster than any other previous email worm.

July 15, 2001 Code Red worm
Code Red was a computer worm observed on the Internet on July 15, 2001. It attacked computers running Microsoft's IIS web server.

The Code Red worm was first discovered and researched by eEye Digital Security employees Marc Maiffret and Ryan Permeh, the Code Red worm exploited a vulnerability discovered by Riley Hassell. They named it "Code Red" because Code Red Mountain Dew was what they were drinking at the time.

Although the worm had been released on July 13, the largest group of infected computers was seen on July 19, 2001. On this day, the number of infected hosts reached 359,000.

September 18th, 2001 Nimda worm
Nimda is a malicious file, infecting computer worm. It spreads, surpassing the economic damage caused by previous outbreaks such as Code Red.

The first released advisory about this thread (worm) was released on September 18th, 2001. Due to the release date, exactly one week after the 9\11 attacks on the World Trade Center and Pentagon, some media quickly began speculating a link between the virus and Al Qaeda, though this theory ended up proving unfounded.

Nimda affected both user workstations (clients) running Windows 95, 98, NT, 2000 or XP and servers running Windows NT and 2000.

The worm's name origin comes from the reversed spelling of "admin".

F-Secure found the text "Concept Virus(CV) V.5, Copyright(C)2001 R.P.China" in the Nimda code, suggesting its country of origin.

February 2002, Jeremiah Jacks
In February 2002, Jeremiah Jacks discovered that Guess.com was vulnerable to an SQL injection attack, permitting anyone able to construct a properly-crafted URL to pull down 200,000+ names, credit card numbers and expiration dates in the site's customer database.

Over view
Titan Rain was the designation given by the federal government of the United States to a series of coordinated attacks on American computer systems since 2003; they were known to have been ongoing for at least three years.

The attacks were labeled as Chinese in origin, although their precise nature, e.g., state-sponsored espionage, corporate espionage, or random hacker attacks, and their real identities – masked by proxy, zombie computer, spyware/virus infected – remain unknown. The activity known as "Titan Rain" is believed to be associated with an Advanced Persistent Threat.

In early December 2005 the director of the SANS Institute, a security institute in the United States, said that the attacks were "most likely the result of Chinese military hackers attempting to gather information on U.S. systems."

Their targets
Titan Rain hackers gained access to many United States defense contractor computer networks who were targeted for their sensitive information, including those at Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA.

The attackers
The series of attacks are believed by some to be the actions of the People’s Liberation Army (PLA), rather than some freelance Chinese hackers. These hackers attacked both the American (Defense Intelligence Agency – DOD) and British Government Departments (Ministry of Defence – MOD). The British government had an incident in 2006 where a part of the House of Commons computer system was shut down by - initially thought to be an individual – an “organised Chinese hacking group.” Although most of the evidence has pointed to the Chinese government as the attackers, the Chinese government has claimed that it was not them who attacked the United States, leading to another possibility that it was hackers using Chinese computers.

August 2003 Mimail attack
Mimail is a computer worm which first emerged in August 2003; it is transmitted via e-mail. Since its initial release, nearly two dozen variants of the original Mimail worm have appeared. The Mydoom worm, which emerged in January 2004, was initially believed to be a variant of Mimail. Mimail is written in the C programming language.

Global attack of 22nd August 2003
The hard hitting 'Sobig.F' virus spread to 134 countries in just 96 hours, generating tens of millions of e-mails. It was the fastest-growing computer virus in history as of that date.

26 January 2004 to 18 February 2005 Mydoom attacks
Mydoom, also known as W32.MyDoom@mm, Novarg, Mimail.R and "'Shimgapi'", is a computer worm affecting Microsoft Windows. It was first sighted on January 26, 2004. It became the fastest-spreading e-mail worm ever (as of January 2004), exceeding previous records set by the Sobig worm and ILOVEYOU, a record which as of 2017 has yet to be surpassed.

A modified form was later released on July 2009.

Doomjuice February 9th, 2004
Doomjuice is a variant of the Mydoom computer worm, in two variants known as Doomjuice.A or Doomjuice.B. It infects Microsoft Windows utilizing the ports left open by the Mydoom.A and Mydoom.B worms. This worm also launches a Denial of Service (DoS) attack on the Microsoft Web site. It struck on February 9th, 2004.

January 13, 2006 Rhode Island attack
On January 13, 2006, Russian computer criminals broke into a Rhode Island government website and allegedly stole credit card data from individuals who have done business online with state agencies.

The attacks
A series of cyber attacks began 27 April 2007 that swamped websites of Estonian organizations, including Estonian parliament, banks, ministries, newspapers and broadcasters, amid the country's disagreement with Russia about the relocation of the Bronze Soldier of Tallinn, an elaborate Soviet-era grave marker, as well as war graves in Tallinn. Most of the attacks that had any influence on the general public were distributed denial of service type attacks ranging from single individuals using various methods like ping floods to expensive rentals of botnets usually used for spam distribution. Spamming of bigger news portals commentaries and defacements including that of the Estonian Reform Party website also occurred.

Some observers reckoned that the onslaught on Estonia was of a sophistication not seen before. The case is studied intensively by many countries and military planners as, at the time it occurred, it may have been the second-largest instance of state-sponsored cyberwarfare, following Titan Rain.

As of January 2008, one ethnic-Russian Estonian national has been charged and convicted.

During a panel discussion on cyber warfare, Sergei Markov of the Russian State Duma has stated his unnamed aide was responsible in orchestrating the cyber attacks. Markov alleged the aide acted on his own while residing in an unrecognised republic of the former Soviet Union, possibly Transnistria.[6] On 10 March 2009 Konstantin Goloskokov, a "commissar" of the Kremlin-backed youth group Nashi, has claimed responsibility for the attack. Experts are critical of these varying claims of responsibility.

Origins of the attacks
Critical systems whose network addresses would not be generally known were targeted, including those serving telephony and financial transaction processing. Although not all of the computer crackers behind the cyberwarfare have been unveiled, some experts believed that such efforts exceed the skills of individual activists or even organised crime as they require a co-operation of a state and a large telecom company.

A Commissar of the Nashi pro-Kremlin youth movement in Moldova and Transnistria, Konstantin Goloskokov (Goloskov in some sources), admitted organizing cyberattacks against Estonian government sites. Goloskokov stressed, however, that he was not carrying out an order from Nashi's leadership and said that a lot of his fellow Nashi members criticized his response as being too harsh.

Like most countries, Estonia does not recognise Transnistria, a secessionist region of Moldova. As an unrecognised nation, Transnistria does not belong to Interpol. Accordingly, no Mutual Legal Assistance Treaty applies. If residents of Transnistria were responsible, the investigation may be severely hampered, and even if the investigation succeeds finding likely suspects, the legal recourse of Estonian authorities may be limited to issuing all-EU arrest warrants for these suspects. Such an act would be largely symbolic.

Head of Russian Military Forecasting Center, Colonel Anatoly Tsyganok confirmed Russia's ability to conduct such an attack when he stated: "These attacks have been quite successful, and today the alliance had nothing to oppose Russia's virtual attacks", additionally noting that these attacks did not violate any international agreement.

2007 Zeus (malware) atacks
Zeus, ZeuS, or Zbot is a Trojan horse malware package that runs on versions of Microsoft Windows. While it can be used to carry out many malicious and criminal tasks, it is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing. It is also used to install the CryptoLocker ransomware. Zeus is spread mainly through drive-by downloads and phishing schemes. First identified in July 2007 when it was used to steal information from the United States Department of Transportation, it became more widespread in March 2009. In June 2009 security company Prevx discovered that Zeus had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster.com, ABC, Oracle, Play.com, Cisco, Amazon, and BusinessWeek. Similarly to Koobface, Zeus has also been used to trick victims of tech support scams into giving the scam artists money through pop-up messages that claim the user has a virus, when in reality they might have no viruses at all. The scammers may use programs such as Command prompt or Event viewer to make the user believe that their computer is infected.

Overview
The July 2009 cyberattacks were a series of coordinated cyberattacks against major government, news media, and financial websites in South Korea and the United States. The attacks involved the activation of a botnet—a large number of hijacked computers—that maliciously accessed targeted websites with the intention of causing their servers to overload due to the influx of traffic, known as a DDoS attack. Most of the hijacked computers were located in South Korea. The estimated number of the hijacked computers varies widely; around 20,000 according to the South Korean National Intelligence Service, around 50,000 according to Symantec's Security Technology Response group, and more than 166,000 according to a Vietnamese computer security researcher who analyzed the log files of the two servers the attackers controlled.

The timing and targeting of the attacks have led to suggestions that they may be from North Korea, although these suggestions have not been substantiated.

First wave
The first wave of attacks occurred on July 4, 2009 (Independence Day holiday in the United States), targeting both the United States and South Korea. Among the websites affected were those of the White House and The Pentagon. An investigation revealed that 27 websites were targets in the attack based on files stored on compromised systems.

Second wave
The second wave of attacks occurred on July 7, 2009, affecting South Korea. Among the websites targeted were the presidential Blue House, the Ministry of Defense, the Ministry of Public Administration and Security, the National Intelligence Service and the National Assembly.

Third wave
A third wave of attacks began on July 9, 2009, targeting several websites in South Korea, including the country's National Intelligence Service as well as one of its largest banks and a major news agency. The U.S. State Department said on July 9 that its website also came under attack. State Department spokesman Ian Kelly said: "I'm just going to speak about our website, the state.gov website. There's not a high volume of attacks. But we're still concerned about it. They are continuing." U.S. Department of Homeland Security spokesperson Amy Kudwa said that the department was aware of the attacks and that it had issued a notice to U.S. federal departments and agencies to take steps to mitigate attacks.

Effects
Despite the fact that the attacks have targeted major public and private sector websites, the South Korean Presidential office has suggested that the attacks are targeted towards causing disruption, rather than stealing data. However, Jose Nazario, manager of a U.S. network security firm, claimed that the attack is estimated to have produced only 23 megabits of data per second, not enough to cause major disruptions. Joe Stewart, researcher at SecureWorks' Counter Threat Unit, said that the data generated by the attacking program appeared to be based on a Korean-language browser.

It was expected that the economic costs associated with websites being down would be large, as the disruption had prevented people from carrying out transactions, purchasing items or conducting business.

Perpetrators
It is not known who is behind the attacks. Reports indicate that the type of attacks being used, commonly known as distributed denial-of-service attacks, were unsophisticated. Given the prolonged nature of the attacks, they are being recognized as a more coordinated and organized series of attacks. According to the South Korean National Intelligence Service, the source of the attacks was tracked down and the government activated an emergency cyber-terror response team who blocked access to five host sites containing the malicious code and 86 websites that downloaded the code, located in 16 countries, including the United States, Guatemala, Japan and the People's Republic of China, but North Korea was not among them. Later, it has been discovered that the malicious code responsible for causing the attack, identified as W32.Dozer, is programmed to destroy data on infected computers and to prevent the computers from being rebooted. South Korean police are analyzing a sample of the thousands of computers used to crash websites, stating that there is "various evidence" of North Korean involvement, but said they may not find the culprit. Security experts said that the attack re-used code from the Mydoom worm. One analyst thinks that the attacks likely came from the United Kingdom.

On October 30, 2009, South Korea's spy agency, the National Intelligence Service, stated the origin of the attacks were from North Korea's telecommunications ministry.

November 8, 2010 British Royal Navy attack
On November 8, 2010 the British Royal Navy website was compromised by a Romanian hacker named TinKode using SQL injection.

April 17 and April 19, 2011 PlayStation Network outage
The 2011 PlayStation Network outage was the result of an "external intrusion" on Sony's PlayStation Network and Qriocity services, in which personal details from approximately 77 million accounts were compromised and prevented users of PlayStation 3 and PlayStation Portable consoles from accessing the service. The attack occurred between April 17 and April 19, 2011, forcing Sony to turn off the PlayStation Network on April 20. On May 4 Sony confirmed that personally identifiable information from each of the 77 million accounts had been exposed. The outage lasted 23 days.

At the time of the outage, with a count of 77 million registered PlayStation Network accounts, it was one of the largest data security breaches in history. It surpassed the 2007 TJX hack which affected 45 million customers. Government officials in various countries voiced concern over the theft and Sony's one-week delay before warning its users.

Sony stated on April 26 that it was attempting to get online services running "within a week." On May 14, Sony released PlayStation 3 firmware version 3.61 as a security patch. The firmware required users to change their password upon signing in. At the time the firmware was released, the network was still offline. Regional restoration was announced by Kazuo Hirai in a video from Sony. A map of regional restoration and the network within the United States was shared as the service was coming back online.

Norwegian attack of July 9th, 2014
Anonymous Norway claimed responsibility for massive cyber-attack on Norwegian banks, but not the Norwegian insurance firms.


 * The victims were-
 * 1) DNB
 * 2) Danske Bank
 * 3) Nordea
 * 4) Norges Bank
 * 5) Sparebank 1
 * 6) Telenor
 * 7) Storebrand
 * 8) Gjensidige

August 2014 Hold Security attack
In August 2014, Milwaukee-based computer security company Hold Security disclosed that it uncovered a theft of confidential information from nearly 420,000 websites through SQL injections. The New York Times confirmed this finding by hiring a security expert to check the claim.

November 24, 2014, Sony Pictures hack
On November 24, 2014, a hacker group which identified itself by the name "Guardians of Peace" (GOP) leaked a release of confidential data from the film studio Sony Pictures. The data included personal information about Sony Pictures employees and their families, e-mails between employees, information about executive salaries at the company, copies of then-unreleased Sony films, and other information.[1]

In November 2014, the GOP group demanded that Sony pull its film The Interview, a comedy about a plot to assassinate North Korean leader Kim Jong-Un, and threatened terrorist attacks at cinemas screening the film. After major U.S. cinema chains opted not to screen the film in response to these threats, Sony elected to cancel the film's formal premiere and mainstream release, opting to skip directly to a digital release followed by a limited theatrical release the next day.[2][3][4]

United States intelligence officials, after evaluating the software, techniques, and network sources used in the hack, alleged that the attack was sponsored by North Korea.[5] North Korea has denied all responsibility.

Novetta blamed the Lazarus Group,Lazarus Group is a cybercrime group

Stammberger provided to the FBI Norse's findings that suggest the hack was an inside job, stating, "Sony was not just hacked; this is a company that was essentially nuked from the inside. After a private briefing lasting three hours, the FBI formally rejected Norse's alternative assessment.[98]

The report, published in collaboration with Kaspersky Lab, Symantec, AlienVault, Invincea, Trend Micro, Carbon Black, PunchCyber, RiskIQ, ThreatConnect and Volexity, concluded that a well-resourced organization had committed the intrusion, a

6] Symantec reported in 2017 that it was "highly likely" that Lazarus was behind the WannaCry attack.[7]

The WannaCry Malware that affected as many as 300,000 computers worldwide are likely authored by hackers from southern China, Hong Kong, Taiwan or Singapore, said a US intelligence company.[8]

October 2015 Talk Talk attack
October 2015, an SQL injection attack was used to steal the personal details of 156,959 customers from British telecommunications company Talk Talk's servers, exploiting a vulnerability in a legacy web portal.

NHS Orkney attack of August 2015
NHS Orkney had a virus that encrypt a number of internal files.

Ukraine attack of Christmas 2015
A cyberattack cut electricity to nearly 250,000 Ukrainians 2 days before Christmas 2015, at exactly 00:00.00. Ukranian time.

World wide
Over 100 banks in 30 countries and NHS Grampian logged the largest number of cyber attacks (2,250) against Scotland’s health boards in the last 3 years (2013-2016). Scottish businesses £5billion per year over these 3 years.

Bangladesh Bank robbery of February 2016


The Bangladesh Bank robbery, also known colloquially as the Bangladesh Bank heist, took place in February 2016, when instructions to steal US$951 million from Bangladesh Bank, the central bank of Bangladesh, were issued via the SWIFT network. Five transactions issued by hackers, worth $101 million and withdrawn from a Bangladesh Bank account at the Federal Reserve Bank of New York, succeeded, with $20 million traced to Sri Lanka (since recovered) and $81 million to the Philippines (about $18 million recovered). The New York Fed blocked the remaining thirty transactions, amounting to $850 million, at the request of Bangladesh Bank. It was identified later that Dridex malware was used for the attack. Atiur Rahman, Governor of Bangladesh Bank who resigned from his post in response to the case and On August 5, 2016, the Bangko Sentral ng Pilipinas approved a ₱1 billion (~US$52.92 million) fine against RCBC for its non-compliance with banking laws and regulations in connection with the bank robbery. This is the largest monetary fine ever approved by BSP against any institution. RCBC stated that the bank will comply with the BSP's decision, and will pay the imposed fine.

16-21 October 2016 Cyber Attacks on the USA
It was a Russian (?) tempt to undermine Hillary Clinton's chances of winning in the American presidential elections and unfairly put Donald Trump in power with out his knowing it.

Dyn Inc. and NHS, attacks in October 2016
On 21 October 2016, Dyn's networks were attacked three times by hackers using a DDOS attack, causing major sites including Twitter, Reddit, GitHub, Amazon, Netflix, Airbnb, Spotify, Runescape, and its own website (http://www.dyn.com), and many others to become unreachable.

The principle sources of the attack including cameras, residential gateways, computer printers and baby monitors, that had been infected and zombifyed with the Mirai Mmalware.

30 October-November 01, 2016 saw Lincoln and Goolde NHS Trust networks in Scunthorpe and Grimsby taken off line for 3 days by a ransom were attack.

Kenyan and Liberia attacks in November 2016
November 2nd saw a mas hacking of the Kenyan government.

Liberia was the cut off by similar attacks on November 3rd and 8th.

Yahoo attack of December 14, 2016
1 Billion Yahoo User Accounts Were Hacked and information like passwords stolen.

March 15, 2017 Twitter attack
Swastikas were stamped on Twitter pages for a day or so by hackers.

Cambrian College attack of May 1, 2017
A $54,000 or 30 bitcoins ransom ware attack hit Canada's Cambrian College.

Baltic energy networks atack of May 11th-16th, 2017
A suspected Russia-backed hackers target Baltic energy networks on May 11th, 2017.

Overview
Some very sophisticated and well dedicated scum-bags, suspected to be in a organised crime outfit, caused a lot of unwanted suffering on May 12th, 2017. It started with hitting 99 countries on the 12th and 150 (?) by the 15th with targets including the UK's NHS, Spain's Telefónica S.A., Spain's energy system, El Mundo and possibly some minor US health firms and a O'Porto dentist's surgery.

A black, white and red or black only screen with a image of a lock on it, containing red, black or white text notice came up on the screen saying show a program demanding $300 (£230) in bitcoin within 3 days or $600 within 7 days, that looks similar to or actualy is the ransomware known as WannaCryptor or WCry. If it is not done, the shit heads say that will wipe the data.

The virus
WannaCry, also known as WanaCrypt0r 2.0, is a ransomware software package. In May 2017, a large scale infection started affecting Telefónica and several other large companies in Spain, as well as parts of the British National Health Service. Many other countries were attacked by WanaCrypt0r 2.0. Other targets in at least 11 countries were also reported to have been attacked around the same time. WannaCry is believed to use the EternalBlue exploit to attack computers running Microsoft Windows operating systems.

WannaCry is believed to use the EternalBlue exploit, which was developed by the U.S. National Security Agency (NSA) to attack computers running Microsoft Windows operating systems. Although a patch to remove the underlying vulnerability for supported systems had been issued on 14 March 2017, delays in applying security updates and lack of support by Microsoft of legacy versions of Windows left many users vulnerable. Due to the scale of the attack, to deal with the unsupported Windows systems, Microsoft has taken the unusual step of releasing updates for all older unsupported operating systems from Windows XP onwards.

Shortly after the attack began a researcher found an effective kill switch, which prevented many new infections. This greatly slowed the spread. However, it has been reported that subsequently new versions of the attack have been detected which lack the kill switch, thus able to spread to systems in which the vulnerability has not been patched.

Following an investigation by The Sunday Times, which showed that YouTube was "providing a platform for criminals promoting and selling ransomware" by allowing hackers to post step-by-step guides to build ransomware on the platform, as well as providing links to websites where ransomware can be purchased for $20 (£15), YouTube terminated at least one channel and removed other guides on how to build ransomware.

Computers targeted
According to Wired, affected systems will also have had the DOUBLEPULSAR backdoor installed; this will also need to be removed when systems are decrypted.

Windows systems Microsoft had taken the unusual step of releasing updates for the long unsupported Windows XP and Windows Server 2003 and patches for Windows 8 operating systems. Shortly after the attack began a British and American researcher found an effective kill switch.

More than 230,000 computers were infected by 10.30pm on 14th of May 2017. As of 17 May 2017, at 2:33am UTC, May 17th, a total of 238 payments totaling $72,144.76 had been transferred.

Arne Schönbohm (de), President of Germany's Federal Office for Information Security (BSI), stated that:
 * "the current attacks show how vulnerable our digital society is. It's a wake-up call for companies to finally take IT security [seriously]".

UK government cover-up
In the UK the impact on the NHS quickly became political, with claims that the effects were exacerbated by Conservative Party under-funding of the NHS as part of the government's austerity measures, in particular the refusal to pay extra to keep protecting outdated Windows XP systems from such attacks. Home secretary Amber Rudd refused to say whether patient data had been backed up, and shadow health secretary Jon Ashworth accused health secretary Jeremy Hunt of refusing to act on a critical note from Microsoft, the National Cyber Security Centre (NCSC) and the National Crime Agency two months previously.


 * According the UK government 0 trusts were sill down on the 13th down and 5% used XP.
 * According to NHS England 5 trusts were sill down on the 13th down and 20% used XP.
 * According to NHS staff 7 trusts were sill down on the 14th down and most used XP, the rest being Windows 7 and Widowas 8.
 * The health secatery said the NHS, like all of us, should have backed up our data and updated our computers in accordance to Microsoft wishes.
 * The BBC and Sky News said mostly XPs were hit, but thire with some later OSs were also victims by May 15.
 * The British Defense Secretary, Michael Fallon, said on May 15th that the NHS has been given about £50m to pay for them to improve theirs computer systems and was repeatedly warned about cyber threats before the attack took place.
 * Later, Jon Ashworth accused health secretary Jeremy Hunt of refusing to act on a critical note from Microsoft, the National Cyber Security Centre (NCSC) and the National Crime Agency two months previously on May (?).

Romania

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at - at 10.00pm, May 12.
 * Automobile Dacia (Mioveni plant) attack at - at 12.30pm, May 13.
 * Ministry of Foreign Affairs on 1.45pm, May 12
 * Ministry of Foreign Affairs on 16.45pm, May 12

San Marino

 * N\A noteworthy attack at 4.15am, May 12

Vatican

 * N\A noteworthy attack at 4.15am, May 12

Andorra

 * N\A noteworthy attack at 4.15am, May 12

Germany

 * Deutsche Bahn at 4.15am, May 12
 * N\A noteworthy attack at - 4.30pm, May 12
 * Deutsche Bahn at N\A, May 14
 * O2 (Germany) (16:50, May 19)

Austria

 * N\A noteworthy attack at 4.15am, May 12

Hungary

 * N\A noteworthy attack at 4.15am, May 12
 * Telenor Hungary attack at 10.35pm, May 12

Greece
N\A noteworthy attack at (?)- at 00.00am (May 13th).

Albania
N\A noteworthy attack at (?)- at 00.00am (May 13th).

Bulgaria
N\A noteworthy attack at - at 00.00am (May 13th).

Lithuania

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).

Latvia

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).

Macedonia
N\A noteworthy attack at - at 00.00am (May 13th).

Poland
N\A noteworthy attack at - at 00.00am (May 13th).

Czechia

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).

Slovakia

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).

Denmark

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).

Luxembourg
N\A noteworthy attack at - at 00.00am (May 13th).

Netherlands

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).
 * Q-Park at 9.10pm, May 13

Belgium

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).

France

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).
 * Renault (in France) - at 12.30pm (May 13th).
 * Renault (in France) - at N\A (May 14th).

Sweden

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).
 * Sandvik at 0.35am, May 13
 * Timrå kommun at 17.55, May 12

UK

 * N\A noteworthy attack at 4.15am, May 12
 * National Health Service UK 10.30, May 12
 * NHS England- 3pm, May 12th
 * East and North Hertfordshire NHS trust,
 * St. Barts Health in London,
 * Essex Partnership university NHS trusts,
 * The university hospitals of Morecambe Bay NHS foundation trust,
 * Nottingham's hospitals
 * Liverpool's hospitals
 * Southport and Ormskirk hospital NHS trust
 * Blackpool teaching hospital NHS foundation trust.
 * Lincoln and Goolde NHS Trust.
 * United Lincolnshire Health Trusts
 * York teaching hospital NHS trust.
 * Nissan (Sunderland)- 12.30pm May 13th
 * Nissan UK at 1.00am, May 13
 * NHS Scotland- 4.30pm, May 12th
 * Forth Division
 * Clyde Division
 * Grater Glasgow Division
 * Dumfiress and Galloway Division
 * A Dundee GP and dental surgery
 * Scottish Ambulance Service- 18.00 on May 12th

Spain

 * Banco Bilbao Vizcaya Argentaria at 9.55pm, May 12
 * Telefónica at 9.55pm, May 12
 * N\A noteworthy attack at 4.15am, May 12
 * Telefónica S.A.- 3.00pm, May 12
 * The energy system- 4.30pm, May 12
 * El Mundo- 5.30pm, May 12
 * Public utilities at 5.00am, May 14

Portugal

 * N\A noteworthy attack at 4.15am, May 12
 * A O'Porto dentist's surgery (?) - 3.00pm, May 12
 * N\A noteworthy attack at 4.10.pm, May 12
 * Portugal Telecom at 2.00pm, May 12

Italy

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at 4.10.pm, May 12
 * University of Milano-Bicocca (Italy) N\A, 12 May

Switzerland
N\A noteworthy attack at 12.00pm (May 15th).

Ireland
N\A noteworthy attack at 12.00pm (May 15th).

Iceland
N\A noteworthy attack at 12.00pm (May 15th).

Belarus
N\A noteworthy attack at - at 00.00am (May 13th).

Armenia
N\A noteworthy attack at (?)- at 00.00am (May 13th).

Azerbaijan

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).

Turkmenistan

 * N\A noteworthy attack at 4.15am, May 12

Russia

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at 4.10.pm, May 12.
 * Russia's Interior Ministry at 8.30pm, May 12.
 * Russia's Emergency Ministry at 11.15pm, May 12.
 * MegaFon at 11.15pm, May 12.
 * MegaFon at 4.40, May 13
 * Ministry of Internal Affairs at 11.00pm, May 12
 * Russian Railways on N\A, May 13
 * N\A noteworthy attack at (?) at 10.00pm, May 12
 * Sberbank at 16.55, May 15

Ukraine

 * N\A noteworthy attack at 4.10.pm, May 12
 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) at 10.00pm, May 12

Uzbekistan

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at - at 10.00pm.

Tajikistan
N\A noteworthy attack at (?)- at 10.00pm.

Kirghizia

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?)- at 00.00am (May 13th).

Kazakhstan

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at - at 10.00pm, may 12.

Australia

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at - 4.30pm, May 12
 * N\A noteworthy attack at - at 10.00pm, May 12.
 * N\A noteworthy attack at - at 10.00pm, May 13.
 * 1 N\A firm had a noteworthy attack on at 1.45 on May 15.

Papua Maw Guinea

 * N\A noteworthy attack on at 1.45 on May 15.

New Zealand

 * N\A noteworthy attack at 12.00pm (May 15th).

Kenya

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at - at 9.15pm (May 13th).

Uruguay

 * N\A noteworthy attack at 4.15am, May 15
 * N\A noteworthy attack at 12.00pm (May 15th).
 * N\A noteworthy attack on at 1.45 on May 15.
 * N\A noteworthy attack at 4.15am, May 16
 * N\A noteworthy attack at 4.15pm, May 16
 * N\A noteworthy attack at - at 9.15pm (May 16th).
 * N\A noteworthy attack at - at 12.15pm (May 17th).

S. Africa

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at - at 00.00am (May 13th).
 * N\A noteworthy attack at - at 12.30pm (May 13th).
 * Telkom (N\A, May 21)

Morocco

 * N\A noteworthy attack at 4.15am, May 12

Tunisia

 * N\A noteworthy attack at 4.15am, May 12

Niger

 * N\A noteworthy attack at 4.15am, May 12

Nigeria

 * N\A noteworthy attack at 4.15am, May 12
 * A Lagos car showroom attack at 4.25pm, May 12

Angola

 * N\A noteworthy attack at 4.15am, May 12

Mozambique

 * N\A noteworthy attack at 4.15am, May 12

Tanzania

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) at 10.00pm, May 12

Ethiopia
N\A noteworthy attack at 12.00pm (May 15th).

Uganda
N\A noteworthy attack at 12.00pm (May 15th).

Georgia
N\A noteworthy attack at 12.00pm (May 15th).

Namibia
N\A noteworthy attack at 12.00pm (May 15th).

Congo (Brazzaville)
N\A noteworthy attack at 12.00pm (May 15th).

Zimbabwe
N\A noteworthy attack at 12.00pm (May 15th).

Reunion
N\A noteworthy attack at 12.00pm (May 15th).

Mauritius
N\A noteworthy attack at 12.00pm (May 15th).

Zambia
N\A noteworthy attack at 12.00pm (May 15th).

N. Sudan

 * N\A noteworthy attack at 11.00am (May 15th).

Cameroon

 * N\A noteworthy attack at 11.00am (May 15th).

Togo

 * N\A noteworthy attack at 11.00am (May 15th).

Cape Verde

 * N\A noteworthy attack at 11.00am (May 15th).

Benin

 * N\A noteworthy attack at 11.00am (May 15th).

Ghana

 * N\A noteworthy attack at 11.00am (May 15th).

Algeria

 * N\A noteworthy attack at 11.00am (May 15th).

Morocco

 * N\A noteworthy attack at 11.00am (May 15th).

Libya

 * N\A noteworthy attack at 11.00am (May 15th).

Tunisia

 * N\A noteworthy attack at 11.00am (May 15th).

Coate de Ivore

 * N\A noteworthy attack at 11.00am (May 15th).

Liberia

 * N\A noteworthy attack at 11.00am (May 15th).

Sierra Leonine

 * N\A noteworthy attack at 11.00am (May 15th).

Mali

 * N\A noteworthy attack at 11.00am (May 15th).

Senegal

 * N\A noteworthy attack at 11.00am (May 15th).

Gambia

 * N\A noteworthy attack at 11.00am (May 15th).

Mexico

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).

Canada

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).
 * Lakeridge Health (Canada) at N/A on May 13
 * University of Waterloo (?), 10,30pm, May 14
 * Cambrian College attack at 11.35am on May 15th
 * University of Montréal at 3pm, May 16

USA

 * N\A noteworthy attack at 4.15am, May 12
 * A few health care minor firms (?)- 4.pm, May 12
 * 14 major firms (?) 9.30pm, May 12
 * Several noteworthy hospitals 10.30pm, May 12
 * FedEx at 10.00pm, May 12
 * FedEx at 10.30pm, May 12
 * Massachusetts Institute of Technology at 11.00pm on May 14

Guatemala
N\A noteworthy attack at 12.30pm (May 13th).

Costa Rica
N\A noteworthy attack at 12.30pm (May 13th).

Cayman Islands
N\A noteworthy attack at 12.30pm (May 13th).

Panama
N\A noteworthy attack at 12.00pm (May 15th).

Nicaragua
N\A noteworthy attack at 12.00pm (May 15th).

Honduras
N\A noteworthy attack at 12.00pm (May 15th).

El Salvador
N\A noteworthy attack at 12.00pm (May 15th).

Jamaica
N\A noteworthy attack at 12.00pm (May 15th).

Anguilla
N\A noteworthy attack at 12.00pm (May 15th).

Antigua and Barbuda
N\A noteworthy attack at 12.00pm (May 15th).

Aruba

 * N\A noteworthy attack at 11.00am (May 15th).

Bahamas

 * N\A noteworthy attack at 11.00am (May 15th).

Barbados

 * N\A noteworthy attack at 11.00am (May 15th).

Bonaire

 * N\A noteworthy attack at 11.00am (May 15th).

British Virgin Islands

 * N\A noteworthy attack at 11.00am (May 15th).

Curaçao

 * N\A noteworthy attack at 11.00am (May 15th).

Dominica

 * N\A noteworthy attack at 11.00am (May 15th).

Dominican Republic

 * N\A noteworthy attack at 11.00am (May 15th).

Grenada

 * N\A noteworthy attack at 11.00am (May 15th).

Guadeloupe

 * N\A noteworthy attack at 11.00am (May 15th).

Martinique

 * N\A noteworthy attack at 11.00am (May 15th).

Montserrat

 * N\A noteworthy attack at 11.00am (May 15th).

Saba

 * N\A noteworthy attack at 11.00am (May 15th).

Saint Barthélemy

 * N\A noteworthy attack at 11.00am (May 15th).

Saint Kitts and Nevis

 * N\A noteworthy attack at 11.00am (May 15th).

Saint Lucia

 * N\A noteworthy attack at 11.00am (May 15th).

Saint Martin

 * N\A noteworthy attack at 11.00am (May 15th).

Saint Vincent and the Grenadines

 * N\A noteworthy attack at 11.00am (May 15th).

Sint Eustatius

 * N\A noteworthy attack at 11.00am (May 15th).

Sint Maarten

 * N\A noteworthy attack at 11.00am (May 15th).

Trinidad and Tobago

 * N\A noteworthy attack at 11.00am (May 15th).

Turks and Caicos Islands

 * N\A noteworthy attack at 11.00am (May 15th).

United States Virgin Islands

 * N\A noteworthy attack at 11.00am (May 15th).

Guyana

 * N\A noteworthy attack at 12.00pm (May 15th).

Colombia

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).
 * Instituto Nacional de Salud at 9.25pm, May 13
 * Instituto Nacional de Salud at 11.25am, May 13

Bolivia

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).

Venezuela
N\A noteworthy attack at - at 00.00am (May 13th).

Chile

 * LATAM Airlines Group S.A at 4.10am, May 12
 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).

Ecuador

 * N\A noteworthy attack at 4.15am, May 12

Peru

 * N\A noteworthy attack at 4.15am, May 12

Argentina

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).

Brazil

 * N\A noteworthy attack at 4.15am, May 12
 * Petrabras at 10.00pm, May 12th.
 * A Reo De Janero power station (?) at 17.30 on May 13th
 * The energy sector in general (?) at 17.30 on May 13th
 * São Paulo Court of Justice at N/A on May 13
 * São Paulo Court of Justice at 00.30am May 13
 * Vivo (Telefônica Brasil) at N/A on May 13
 * Vivo at 10.20am, May 16

Paraguay
N\A noteworthy attack at 12.00pm (May 15th).

Taiwan

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at 4.10.pm, May 12
 * N\A noteworthy attack at (?) at 10.00pm, May 12

Malaysia

 * N\A noteworthy attack at 4.15am, May 12

Burma
N\A noteworthy attack at 12.00pm (May 15th).

Cambodia
N\A noteworthy attack at 12.00pm (May 15th).

Nepal
N\A noteworthy attack at 12.00pm (May 15th).

Bhutan
N\A noteworthy attack at 12.00pm (May 15th).

Maldives
N\A noteworthy attack at 12.00pm (May 15th).

Brunei
N\A noteworthy attack at 12.00pm (May 15th).

Vietnam

 * N\A noteworthy attack at - 4.30pm, May 12
 * N\A noteworthy attack at 4.15am, May 12

Philippines

 * N\A noteworthy attack at - 4.30pm, May 12
 * N\A noteworthy attack at 4.15am, May 12

Indonesia

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at - 6.30pm, May 12.
 * Several hospitals at 5.00am, May 14
 * Dharmais Hospital 10.00am, May 13
 * Harapan Kita Hospital 10.00am, May 13
 * Universitas Jember, Indonesia at 1.30 am, May 16

Japan

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?)- 6.30pm, May 12
 * N\A noteworthy attack at 4.15am, May 12
 * N\A businesses at N\A on May 15
 * Hitachi attack at 11.45pm on May 15th

China

 * N\A noteworthy attack at 4.15am, May 12
 * 16 major Universities at 10.00pm, May 12.
 * PetroChina at 12.10pm, May 13
 * Public Security Bureaus at 2pm, May 13
 * Sun Yat-sen University at 0.35, May 13
 * Several schools at 5.00am, May 14
 * N\A universities at N\A on May 15
 * N\A schools at N\A on May 15

Singapore

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).
 * Harapan Kita Hospital attack at 10.30 am, May 15th

Macau SAR

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).

HK SAR

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).

Bangladesh

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).

Pakistan

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).

Thailand

 * N\A noteworthy attack at 4.15am, May 12.
 * N\A noteworthy attack at (?) 00.00am (May 13th).
 * Garena Blade and Soul at 12.35, May 13

Iran

 * N\A noteworthy attack at - at 10.00pm, May 12.
 * N\A noteworthy attack at 4.15am, May 12

India

 * N\A noteworthy attack at 4.15am, May 12.
 * N\A noteworthy attack at - at 10.00pm, May 12.
 * Andhra Pradesh Police attack at 1.50am, May 13.
 * West Bengal power supply grid at N\A on May 15.
 * A West Bengal power station at 12.05pm, on May 15.
 * Government of Kerala 3.00pm, on May 15.
 * Government of West Bengal 3.00pm, on May 15.
 * Government of Gujarat 3.00pm, on May 15.

S. Korea

 * N\A noteworthy attack at 4.15am, May 12.
 * N\A noteworthy attack at - at 06.30am (May 13th).
 * CGV- N\A on May 15th.
 * CJ CGV attack at 11.45pm on May 15th
 * Bus Station- N\A on May 15th.

Turkey

 * N\A noteworthy attack at 4.15am, May 12.
 * N\A noteworthy attack at - 4.30pm, May 12.
 * N\A noteworthy attack at (?) at 10.00pm, May 12.

Oman
N\A noteworthy attack at (?)- at 00.00am (May 13th).

UAE

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).

Israel

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at (?) 00.00am (May 13th).

Saudi Arabia

 * N\A noteworthy attack at 4.15am, May 12>
 * N\A noteworthy attack at (?) 00.00am (May 13th).
 * Saudi Telecom at 00.00am (May 14th).
 * Saudi Telecom Company at N\A on 14 May
 * The laptop of Waseem Ahammed at N\A on May 14th

Kuwait

 * N\A noteworthy attack at 4.15am, May 12

Israel

 * N\A noteworthy attack at 4.15am, May 12

Jordan

 * N\A noteworthy attack at 4.15am, May 12

Egypt

 * N\A noteworthy attack at 4.15am, May 12
 * N\A noteworthy attack at - at 10.00pm, May 12th.

The blame game

 * http://www.libertatea.ro, some NATO figures and some people in the Romanian governments said the online terrorist group FancyBears did it.
 * The American traitor Edward Snowden, several UK tech experts and US tech experts said the American secret service did it.
 * Some French tech experts said the people who sold the data to Wikileaks cause it indirectly by spreading forbidden knowledge with the aim of causing anarchy on line.
 * Microsoft officials were angry that they were not told of the unintended 'back-door' since they could have patched it, but let the secret service use it when necessary. A spokesman accused them of slack protection of thire cyber weapons as akin to the theft of cruise missiles from a poorly guarded conventional arms depot.
 * The Russian goverment blamed the American government.
 * The American goverment blamed the N. Korean government for it.
 * The Ukrainan goverment blamed the Russian government for it.
 * Europol blamed organised crime for both it's creation and use.
 * Some British people believed it was a Islamist\Hillary Clinton\NSA\Ukrainian world takeover bid.
 * Although cybersecurity companies Kaspersky Lab and Symantec had both said by May 16 that the code has some similarities with that previously used by the Lazarus Group, (believed to have carried out the cyberattack on Sony Pictures in 2014 and a Bangladesh bank heist in 2016 – and linked to North Korea), this may be either simple re-use of code by another group, or an attempt to shift blame – as in a false flag operation.

The attack
May 27th, 2017 saw the global hacking and crashing of British Airways' commuters. BA's main web page were still affected after 24 hours. Heathrow and Gatwick were still not fully restored after 48 hours. The UK government and BA denied it was an attack, despite it looking like a attack.

The blame game

 * 1) A local power cut in the location of the Indian data center.
 * 2) A local power surge in the location of the Indian data center.
 * 3) A local power cut in the location of the Heathrow data center.

Overview
Tuxissa is a fictional computer virus hoax made up by Humorix, a humor website on Linux.

Although the website states that all articles there are fake, anti-virus software makers such as Symantec, Sophos and F-Secure had pages for the Tuxissa virus hoax.

How it works (in theory)
The virus is based on the Melissa virus, with its aim to install Linux onto the victim's computer without the owner's notice. It is spread via e-mail, contained within a message titled "Important Message About Windows Security". It first spreads the virus to other computers, then it downloads a stripped-down version of Slackware, and uncompresses it onto the hard disk. The Windows Registry is finally deleted, and the boot options changed. There the virus destroys itself when it reboots the computer at the end, with the user facing the Linux login prompt.

Also see

 * 1) Science
 * 2) Help desk
 * 3) The 5 Eyes
 * 4) Codeine addiction help
 * 5) The YK2\Millennium bug
 * 6) How to tell your election was rigged!?
 * 7) How to save your PC during Cyber-war\E-warfair

Links

 * 1) https://www.wikiwand.com/en/Timeline_of_computer_viruses_and_worms
 * 2) https://www.wired.com/2016/05/insane-81m-bangladesh-bank-heist-heres-know/
 * 3) http://fortune.com/2016/03/12/malware-bangladesh-bank-heist/
 * 4) https://www.wikiwand.com/en/List_of_bank_robbers_and_robberies
 * 5) https://www.wikiwand.com/en/Bangladesh_Bank_robbery
 * 6) http://archive.dhakatribune.com/bangladesh/2016/mar/11/anatomy-bank-robbery
 * 7) https://www.wikiwand.com/en/Bangladesh_Bank_robbery
 * 8) https://www.wired.com/story/russia-election-hacking-playbook?mbid=nl_6917_p2&CNDID=
 * 9) https://www.wired.com/2017/04/the-cure-for-pain/?mbid=nl_61017_p2&CNDID=
 * 10) https://www.wired.com/story/apple-campus/?mbid=nl_61017_p1&CNDID=
 * 11) https://en.wikipedia.org/wiki/July_2009_cyberattacks
 * 12) https://www.cnet.com/news/botnet-worm-in-dos-attacks-could-wipe-data-out-on-infected-pcs/
 * 13) http://www.csmonitor.com/World/Asia-Pacific/2009/0709/p06s23-woap.html
 * 14) https://web.archive.org/web/20090712051234/
 * 15) http://www.reuters.com/article/bigMoney/idUS292302408420090709
 * 16) https://www.pri.org/stories/2009-07-11/cyberattack-rocks-south-korea
 * 17) https://web.archive.org/web/20090711054452/
 * 18) http://www.koreatimes.co.kr/www/news/biz/2009/07/123_48203.html
 * 19) https://www.organicfacts.net/yoga.html?utm_source=onesignal21jun17
 * 20) https://www.yahoo.com/news/deliberations-milwaukee-police-shooting-enter-second-day-052037880.html?soc_trk=gcm&soc_src=6d5f98a9-30da-3e21-bf79-2d16fde5d3d4&.tsrc=notification-brknews
 * 21) https://www.yahoo.com/news/un-slams-staggering-loss-civilian-life-raqa-163954662.html
 * 22) http://www.mayoclinic.org/diseases-conditions/high-blood-pressure/basics/risk-factors/con-20019580
 * 23) https://www.wired.com/story/russian-hackers-attack-ukraine?mbid=nl_62017_p1&CNDID=
 * 24) https://www.yahoo.com/news/pence-tells-catholics-prayer-breakfast-trump-back-164909680.html
 * 25) https://www.yahoo.com/news/aid-convoy-besieged-area-comes-under-fire-syria-110259988.html
 * 26) https://www.yahoo.com/news/michigan-airport-evacuated-police-officer-injured-144544805.html
 * 27) https://www.wired.com/story/russia-election-hacking-playbook?mbid=nl_6917_p2&CNDID=
 * 28) https://www.wired.com/2017/04/the-cure-for-pain/?mbid=nl_61017_p2&CNDID=
 * 29) https://www.wired.com/story/apple-campus/?mbid=nl_61017_p1&CNDID=
 * 30) https://web.archive.org/web/20090716043909/
 * 31) https://www.google.com/hostednews/ap/article/ALeqM5jO5PtkM_1FjwMZjh3LS74g26yiUQD99CRCO80
 * 32) https://web.archive.org/web/20110615004758/
 * 33) http://www.networkworld.com/news/2009/071409-uk-not-north-korea-source.html?ap1=rcb
 * 34) http://english.yonhapnews.co.kr/northkorea/2009/10/30/0401000000AEN20091030002200315.HTML
 * 35) https://en.wikipedia.org/wiki/July_2009_cyberattacks
 * 36) https://www.theguardian.com/world/2009/jul/11/south-korea-blames-north-korea-cyber-attacks
 * 37) https://www.organicfacts.net/home-remedies/best-foods-for-healthy-weight-loss.html?utm_source=onesignal7jun17
 * 38) https://www.organicfacts.net/organic-products/organic-food/health-benefits-of-organic-food.html?utm_source=OneSignalJune52017
 * 39) https://uk.news.yahoo.com/nigel-farage-apos-vindicated-apos-155700974.html
 * 40) http://www.msn.com/en-gb/news/uknews/mass-brawl-involving-50-people-breaks-out-on-beach-as-temperatures-soared-leaving-teenage-boy-with-head-injury/ar-BBBAhqx?li=AAmiR2Z&ocid=spartandhp
 * 41) https://uk.finance.yahoo.com/news/battered-oil-fights-back-sterling-hit-mays-poll-084339186--finance.html
 * 42) https://uk.news.yahoo.com/best-wild-swimming-spots-near-090000670.html
 * 43) https://uk.finance.yahoo.com/news/tech-industry-dominated-5-big-213712374.html
 * 44) https://uk.news.yahoo.com/police-identify-suspect-double-killing-oregon-train-152527015.html
 * 45) http://uk.businessinsider.com/samsung-galaxy-s8-apple-iphone-google-pixel-smartphone-2017-4?r=US&IR=T
 * 46) https://uk.finance.yahoo.com/news/ee-vodafone-uk-worst-mobile-060120664.html
 * 47) http://www.standard.co.uk/lifestyle/travel/8-of-the-best-sandy-beaches-near-london-a3241551.html
 * 48) https://uk.sports.yahoo.com/news/apos-maybe-won-apos-t-083039973.html
 * 49) http://www.standard.co.uk/lifestyle/travel/8-of-the-best-sandy-beaches-near-london-a3241551.html
 * 50) https://www.eurowings.com/en/booking/offers/flights-from/GB.html?gwc=add2_b810_YahooNetzwerkUK_5212_84705_70648
 * 51) https://uk.news.yahoo.com/nhs-trauma-centres-told-prepare-potential-terror-attack-171900435.html
 * 52) http://www.dictionary.com/slideshows/10-weather-words-you-need-to-know?param=DcomSERP#Amazing-Weather-Words
 * 53) https://www.organicfacts.net/health-benefits/green-tea.html?utm_source=Onesignal28may2017
 * 54) https://www.organicfacts.net/home-remedies/home-remedies-for-amenorrhea.html?utm_source=OneSignal29may2017
 * 55) https://uk.yahoo.com/news/eight-hurt-drunk-britons-plough-pedestrians-marbella-hit-122800308.html
 * 56) https://uk.yahoo.com/finance/news/rolls-royce-might-most-expensive-163402139.html
 * 57) https://uk.yahoo.com/news/olivia-newton-john-confirms-breast-cancer-returned-002000900.html
 * 58) https://www.organicfacts.net/health-benefits/other/epsom-salts.html?utm_source=OneSignalJune12017
 * 59) https://www.theguardian.com/politics/live/2017/jun/08/general-election-results-2017-uk-live-labour-tories-corbyn-may-election-results-live-news-line
 * 60) https://en.wikipedia.org/wiki/July_2009_cyberattacks
 * 61) http://www.bbc.co.uk/news/technology-12646052
 * 62) https://www.yahoo.com/tech/cyberattack-major-cyber-attacks-over-past-10-years-154337949.html
 * 63) https://www.organicfacts.net/health-benefits/other/health-benefits-of-exercise.html?utm_source=OneSignal30may2017
 * 64) https://uk.yahoo.com/news/olivia-newton-john-confirms-breast-cancer-returned-002000900.html
 * 65) https://www.organicfacts.net/home-remedies/15-ways-to-lose-belly-fat.html?utm_source=OneSignalJune32017
 * 66) http://www.bigbeadlittlebead.com/guides_and_information/history_of_czech_glass_beads.php
 * 67) https://www.organicfacts.net/health-benefits/other/health-benefits-of-laughter.html?utm_source=OneSignalJune22017
 * 68) https://www.organicfacts.net/home-remedies/home-remedies-for-baldness.html?utm_source=OneSignalJune42017
 * 69) https://www.ghanastar.com/news/soldier-mistakenly-lynched-and-burnt/
 * 70) https://www.organicfacts.net/health-benefits/herbs-and-spices/moringa-tea.html?utm_source=OneSignalJune62017
 * 71) http://www.bbc.co.uk/news/technology-12646052
 * 72) http://www.thefullwiki.org/July_2009_cyber_attacks
 * 73) https://www.defensetech.org/2009/07/13/us-ignored-warnings-of-cyber-attack/
 * 74) https://www.dhs.gov/sites/default/files/publications/Cyber%20Storm%20II%20Final%20Report.pdf
 * 75) https://en.wikipedia.org/wiki/Bangladesh_Bank_robbery
 * 76) http://www.mashpedia.com/SQL_injection
 * 77) https://nakedsecurity.sophos.com/2012/01/31/tinkode-arreste/
 * 78) http://blog.csdn.net/lanbingkafei/article/details/8866558
 * 79) https://www.isnare.com/
 * 80) https://it.slashdot.org/story/10/11/08/1515214/royal-navy-website-hacked-passwords-revealedhttps://en.wikipedia.org/wiki/SQL_injection
 * 81) https://www.organicfacts.net/tobacco-addiction.html?utm_source=OneSignal31May2017
 * 82) https://en.wikipedia.org/wiki/SQL_injection
 * 83) https://www.revolvy.com/topic/SQL%20injection&item_type=topic
 * 84) http://www.wow.com/wiki/SQL_injection
 * 85) https://en.wikipedia.org/wiki/July_2009_cyber_attacks
 * 86) https://en.wikipedia.org/wiki/Titan_Rain#Attackers
 * 87) https://web.archive.org/web/20061222110758/http://www.breitbart.com/news/2005/12/12/051212224756.jwmkvntb.html
 * 88) https://en.wikipedia.org/wiki/Reverse_Deception
 * 89) https://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
 * 90) http://news.bbc.co.uk/1/hi/technology/7208511.stm
 * 91) http://www.darkreading.com/blog/archives/2009/03/authoritatively.html
 * 92) https://www.theguardian.com/world/2007/may/17/topstories3.russia
 * 93) http://www.economist.com/node/16478792
 * 94) http://gzt.ru/world/2008/02/07/220025.html
 * 95) http://error.talktalk.co.uk/main?ParticipantID=nmum6rqpq5q6gkm3933n3nf9s76onu6r&FailedURI=http%3A%2F%2Fwww.smoney.ru%2Farticle.shtml%3F2007%252F05%252F28%252F3004%3D&FailureMode=1&Implementation=&AddInType=4&Version=pywr1.0&Referer=https%3A%2F%2Fen.wikipedia.org%2F&ClientLocation=uk
 * 96) http://www.smoney.ru.
 * 97) https://www.veracode.com/security/sql-injection
 * 98) https://www.acunetix.com/websitesecurity/sql-injection/
 * 99) https://www.w3schools.com/sql/sql_injection.asp
 * 100) http://www.xsql.com/products/sql_server_data_compare/
 * 101) https://shop.secpoint.com/shop/cloud-penetrator-s7-419p.html
 * 102) https://www.systematix.co.uk/sql-database-programming-training/microsoft-sql-server-training-courses/
 * 103) https://www.wikiwand.com/en/SQL_injection
 * 104) https://mybroadband.co.za/news/security/211576-telkom-systems-crippled-by-wannacry-ransomware.html
 * 105) https://en.wikipedia.org/wiki/WannaCry_ransomware_attack
 * 106) http://www.focus.de/digital/es-ist-ein-technischer-fehler-aufgetreten-nutzer-koennen-twitter-nicht-aufrufen_id_7156840.html
 * 107) http://www.haz.de/Nachrichten/Wirtschaft/Deutschland-Welt/WannaCry-Kundendienst-von-O2-ausgefallen
 * 108) https://en.wikipedia.org/wiki/Lazarus_Group
 * 109) http://www.politico.com/story/2014/12/fbi-rejects-alternate-sony-hack-theory-113893
 * 110) http://www.bbc.co.uk/news/technology-40010996
 * 111) http://www.inss.org.il/uploadImages/systemFiles/No.%20646%20-%20Gabi%20and%20Dudi%20for%20web.pdf
 * 112) https://en.wikipedia.org/wiki/Sony_Pictures_hack
 * 113) http://www.cbsnews.com/videos/the-attack-on-sony/
 * 114) http://deadline.com/2014/12/sony-hack-timeline-any-pascal-the-interview-north-korea-1201325501/
 * 115) http://www.cbsnews.com/news/north-korean-cyberattack-on-sony-60-minutes/
 * 116) https://www.ghanastar.com/news/soldier-mistakenly-lynched-and-burnt/
 * 117) https://en.wikipedia.org/wiki/Lazarus_Group
 * 118) http://www.politico.com/story/2014/12/fbi-rejects-alternate-sony-hack-theory-113893
 * 119) http://www.bbc.co.uk/news/technology-40010996
 * 120) http://www.inss.org.il/uploadImages/systemFiles/No.%20646%20-%20Gabi%20and%20Dudi%20for%20web.pdf
 * 121) https://en.wikipedia.org/wiki/Sony_Pictures_hack
 * 122) http://www.cbsnews.com/videos/the-attack-on-sony/
 * 123) http://deadline.com/2014/12/sony-hack-timeline-any-pascal-the-interview-north-korea-1201325501/
 * 124) http://www.cbsnews.com/news/north-korean-cyberattack-on-sony-60-minutes/
 * 125) https://www.ghanastar.com/news/soldier-mistakenly-lynched-and-burnt/
 * 126) https://en.wikipedia.org/wiki/July_2009_cyber_attacks
 * 127) https://en.wikipedia.org/wiki/ILOVEYOU
 * 128) https://kb.iu.edu/d/aioe
 * 129) http://computer.howstuffworks.com/worst-computer-viruses2.htm
 * 130) http://www.symantec.com/avcenter/venc/data/tuxissa-hoax.html
 * 131) http://www.sophos.com/virusinfo/hoaxes/tuxissa.html
 * 132) http://humorix.org/articles/1999/03/tuxissa/
 * 133) http://www.f-secure.com/v-descs/april1j.shtml
 * 134) http://www.techrepublic.com/article/security-alert-no-love-in-iloveyou-worm/
 * 135) https://images.search.yahoo.com/search/images;_ylt=AwrBT9hHFCtZWrIA3ylXNyoA;_ylu=X3oDMTByMjB0aG5zBGNvbG8DYmYxBHBvcwMxBHZ0aWQDBHNlYwNzYw--?p=worm+and+ILOVEYOU&fr=yset_chr_cnewtab
 * 136) https://www.symantec.com/security_response/writeup.jsp?docid=2000-122113-1425-99
 * 137) https://web.archive.org/web/20080803094019/http://www.csail.mit.edu/biographies/PI/bioprint.php?PeopleID=301
 * 138) https://en.wikipedia.org/wiki/July_2009_cyber_attacks
 * 139) https://en.wikipedia.org/wiki/Code_Red_(computer_worm)
 * 140) https://en.wikipedia.org/wiki/July_2009_cyber_attacks
 * 141) https://en.wikipedia.org/wiki/Morris_worm
 * 142) https://www.cert.org/historical/advisories/CA-2001-26.cfm
 * 143) https://en.wikipedia.org/wiki/Nimda
 * 144) https://web.archive.org/web/20110722192419/http://www.eeye.com/Resources/Security-Center/Research/Security-Advisories/AL20010717
 * 145) https://en.wikipedia.org/wiki/Code_Red_(computer_worm)
 * 146) https://en.wikipedia.org/wiki/ILOVEYOU
 * 147) https://en.wikipedia.org/wiki/Melissa_(computer_virus)
 * 148) https://en.wikipedia.org/wiki/ILOVEYOU
 * 149) https://kb.iu.edu/d/aioe
 * 150) https://en.wikipedia.org/wiki/Code_Red_(computer_worm)
 * 151) http://computer.howstuffworks.com/worst-computer-viruses2.htm
 * 152) http://www.symantec.com/avcenter/venc/data/tuxissa-hoax.html
 * 153) http://www.sophos.com/virusinfo/hoaxes/tuxissa.html
 * 154) http://humorix.org/articles/1999/03/tuxissa/
 * 155) http://www.f-secure.com/v-descs/april1j.shtml
 * 156) http://www.techrepublic.com/article/security-alert-no-love-in-iloveyou-worm/
 * 157) https://images.search.yahoo.com/search/images;_ylt=AwrBT9hHFCtZWrIA3ylXNyoA;_ylu=X3oDMTByMjB0aG5zBGNvbG8DYmYxBHBvcwMxBHZ0aWQDBHNlYwNzYw--?p=worm+and+ILOVEYOU&fr=yset_chr_cnewtab
 * 158) https://www.symantec.com/security_response/writeup.jsp?docid=2000-122113-1425-99
 * 159) https://web.archive.org/web/20080803094019/http://www.csail.mit.edu/biographies/PI/bioprint.php?PeopleID=301
 * 160) https://en.wikipedia.org/wiki/Morris_worm
 * 161) https://www.cert.org/historical/advisories/CA-2001-26.cfm
 * 162) https://en.wikipedia.org/wiki/Nimda
 * 163) https://web.archive.org/web/20110722192419/http://www.eeye.com/Resources/Security-Center/Research/Security-Advisories/AL20010717
 * 164) https://en.wikipedia.org/wiki/Code_Red_(computer_worm)
 * 165) https://en.wikipedia.org/wiki/ILOVEYOU
 * 166) https://en.wikipedia.org/wiki/Melissa_(computer_virus)
 * 167) https://en.wikipedia.org/wiki/AIDS_%28Trojan_horse%29
 * 168) https://en.wikipedia.org/wiki/AIDS_(computer_virus)
 * 169) http://www.bbc.co.uk/news/live/world-40069977
 * 170) http://www.symantec.com/security_response/writeup.jsp?docid=2004-020909-2916-99
 * 171) https://r.search.yahoo.com/_ylt=AwrC1CnNaylZgwoAZx7QtDMD;_ylu=X3oDMTByMjB0aG5zBGNvbG8DYmYxBHBvcwMxBHZ0aWQDBHNlYwNzYw--/RV=2/RE=1495915597/RO=10/RU=https%3a%2f%2fwww.yahoo.com%2fnews%2fbritish-airways-chaos-computer-systems-103024552.html/RK=1/RS=bDFJTu_VBzE3B2amcDQ6fI0Tsk4-
 * 172) https://www.yahoo.com/news/british-airways-says-computer-outage-causing-global-delays-102858395.html
 * 173) https://en.wikipedia.org/wiki/Mimail
 * 174) https://www.yahoo.com/tech/british-airways-apologises-apos-systems-105600900.html
 * 175) http://edition.cnn.com/2004/TECH/internet/01/28/mydoom.spreadwed/
 * 176) https://en.wikipedia.org/wiki/Mydoom#Timeline
 * 177) https://en.wikipedia.org/wiki/Doomjuice
 * 178) https://www.symantec.com/security_response/writeup.jsp?docid=2003-080109-2046-99
 * 179) https://en.wikipedia.org/wiki/Mimail
 * 180) https://www.wired.com/2009/07/mydoom/
 * 181) http://www3.nhk.or.jp/news/html/20170515/k10010981821000.html?utm_int=detail_contents_news-related-auto_002
 * 182) http://www.eltiempo.com/tecnosfera/novedades-tecnologia/alerta-por-cibertaque-que-golpeo-a-74-paises-87602
 * 183) https://www.usatoday.com/story/tech/news/2017/03/08/wikileaks-cia-cyberwar-pearl-harbor-cyberweapons/98878016/
 * 184) https://en.wikipedia.org/wiki/WannaCry
 * 185) https://www.forbes.com/sites/kevinmurnane/2017/05/13/how-to-protect-yourself-from-the-global-wanacry-ransomware-attack/
 * 186) http://webcache.googleusercontent.com/search?q=cache:http://www.opovo.com.br/jornal/economia/2017/05/wannacry-no-brasil-e-no-mundo.html&gws_rd=cr&ei=anEdWb6hIeLYgAa4tJ_QAw
 * 187) http://www.theglobeandmail.com/news/national/universite-de-montreal-computers-hit-with-wannacry-virus/article35004991/
 * 188) http://milano.repubblica.it/cronaca/2017/05/12/news/milano_virus_ransomware_universita_bicocca-165302056/
 * 189) http://www.theglobeandmail.com/news/national/universite-de-montreal-computers-hit-with-wannacry-virus/article35004991/
 * 190) http://webcache.googleusercontent.com/search?q=cache:http://www.opovo.com.br/jornal/economia/2017/05/wannacry-no-brasil-e-no-mundo.html&gws_rd=cr&ei=CW8dWfayHMuNgAb5mI7QBQ
 * 191) https://www.svt.se/nyheter/inrikes/timra-kommun-drabbat-av-utpressningsattack
 * 192) https://m.tempo.co/read/news/2017/05/17/058876241/pemda-pastikan-suplai-dan-harga-pangan-aman-di-sultra-aman
 * 193) http://milano.repubblica.it/cronaca/2017/05/12/news/milano_virus_ransomware_universita_bicocca-165302056/
 * 194) https://www.timeanddate.com/time/zones/wib
 * 195) https://www.timeanddate.com/time/zones/edt
 * 196) http://www.theglobeandmail.com/news/national/universite-de-montreal-computers-hit-with-wannacry-virus/article35004991/
 * 197) https://www.timeanddate.com/time/zones/edt
 * 198) https://www.timeanddate.com/time/zones/wib
 * 199) http://internacional.elpais.com/internacional/2017/05/15/actualidad/1494855826_022843.html
 * 200) https://en.wikipedia.org/wiki/Sberbank_of_Russia
 * 201) http://www.opovo.com.br/jornal/economia/2017/05/wannacry-no-brasil-e-no-mundo.html
 * 202) https://www.svoboda.org/a/28483898.html
 * 203) http://abcnews.go.com/International/researcher-accidentally-stops-spread-unprecedented-global-cyberattack/story?id=47390745
 * 204) http://www.libertatea.ro/stiri/atac-cibernetic-la-mae-1836024
 * 205) http://abcnews.go.com/International/researcher-accidentally-stops-spread-unprecedented-global-cyberattack/story?id=47390745
 * 206) http://www.eltiempo.com/tecnosfera/novedades-tecnologia/alerta-por-cibertaque-que-golpeo-a-74-paises-87602
 * 207) https://www.timeanddate.com/time/zones/est
 * 208) https://www.timeanddate.com/time/zones/sgt
 * 209) https://www.timeanddate.com/time/zones/ist
 * 210) http://www.ndtv.com/india-news/ransomware-wannacry-surfaces-in-kerala-bengal-10-facts-1693806
 * 211) http://www.straitstimes.com/world/organisations-hit-by-global-cyberattack
 * 212) http://www.koreaherald.com/view.php?ud=20170515000574
 * 213) http://www.cbc.ca/news/canada/sudbury/cambrian-college-ransomware-hack-1.4093634
 * 214) http://uk.businessinsider.com/r-kremlin-says-ukraines-accusation-of-cyber-attack-groundless-2017-5?yptr=yahoo
 * 215) https://www.theguardian.com/society/2017/may/13/jeremy-hunt-ignored-warning-signs-before-cyber-attack-hit-nhs
 * 216) https://www.theguardian.com/technology/2017/may/15/wannacry-ransomware-north-korea-lazarus-group
 * 217) https://blockchain.info/address/12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
 * 218) http://www.hackmageddon.com/category/security/cyber-attacks-timeline/
 * 219) http://thehill.com/policy/cybersecurity/333575-nsa-leakers-that-lead-to-wanna-cry-to-offer-wine-of-the-month-club-for
 * 220) http://bgr.com/2017/05/15/wanna-cry-ransomware-virus-windows-wannacry-explainer/
 * 221) http://buy-static.norton.com/norton/ps/bb/ukhard/hybrid/3up_navb_ns1_ns_uk_en_hybrid60_tw_nbfr.html?om_sem_cid=hho_sem_sy:gb:bng:en:e
 * 222) https://origin-nyi.thehill.com/policy/technology/333732-ransomware-attack-inflames-intelligence-scrutiny
 * 223) https://www.theguardian.com/technology/2017/may/15/wannacry-ransomware-north-korea-lazarus-group
 * 224) https://uk.yahoo.com/finance/news/over-europe-people-suddenly-stopped-115501848.html
 * 225) https://uk.yahoo.com/news/polands-commitment-rule-law-gets-eu-member-state-114406632.html
 * 226) https://uk.yahoo.com/news/general-election-2017-briefing-everything-071026962.html
 * 227) https://uk.finance.yahoo.com/topic/brexit
 * 228) https://uk.style.yahoo.com/sweden-apos-eurovision-act-slams-090955997.html
 * 229) https://www.kaspersky.co.uk/products-services/acqlp-3up-nb?ksid=607f9373-6a54-4e61-91e7-3fb49d2b9494&ksprof_id=465&ksaffcode=48924&ksdevice=c
 * 230) http://www.hackmageddon.com/2016/11/10/16-31-october-2016-cyber-attacks-timeline/
 * 231) https://www.theguardian.com/technology/2017/may/14/cyber-attack-escalate-working-week-begins-experts-nhs-europol-warn
 * 232) http://www.news.com.au/technology/online/hacking/cyber-attack-in-australia-2017-business-hit-by-ransomware/news-story/598e9382bcff0c12ca3e84f960ed8dc1
 * 233) http://www.bbc.co.uk/news/uk-39912825
 * 234) http://www.telegraph.co.uk/technology/2017/05/15/nhs-cyber-attack-latest-authorities-warn-day-chaos-ransomware/
 * 235) http://www.msn.com/en-gb/news/other/labours-barry-gardiner-in-angry-clash-with-nick-robinson-over-sun-frontpage/ar-BBB2PVb
 * 236) http://www.msn.com/en-gb/news/techandscience/cyberattacks-how-can-you-protect-yourself/ar-BBB8ywQ?li=AAmiR2Z&ocid=spartandhp
 * 237) https://twitter.com/AmjedShacker/status/863749329017868293
 * 238) https://nakedsecurity.sophos.com/2017/05/14/wannacry-benefits-from-unlearned-lessons-of-slammer-conficker/
 * 239) https://twitter.com/AmjedShacker/status/863749329017868293
 * 240) https://nakedsecurity.sophos.com/2017/05/14/wannacry-benefits-from-unlearned-lessons-of-slammer-conficker/
 * 241) http://www.libertatea.ro/stiri/atac-cibernetic-la-mae-1836024
 * 242) http://www.libertatea.ro/stiri/exclusiv-roasa-de-saracie-o-mama-si-ingropat-fiul-curtea-casei-povestea-unei-batrane-de-89-de-ani-dintr-un-sat-maramuresean-care-nu-vrut-sa-duca-cu-ea-mormant-un-secret-cutremurator-1838662
 * 243) http://www.news.com.au/technology/online/hacking/massive-cyber-attack-creates-chaos-around-the-world/news-story/b248da44b753489a3f207dfee2ce78a9
 * 244) http://abcnews.go.com/International/researcher-accidentally-stops-spread-unprecedented-global-cyberattack/story?id=47390745
 * 245) https://www.svoboda.org/a/28483898.html
 * 246) http://www.elperiodico.com/es/noticias/sociedad/ataque-informatico-masivo-infecta-las-grandes-empresas-espana-6033534
 * 247) http://www.elperiodico.com/es/noticias/sociedad/ataque-informatico-masivo-infecta-las-grandes-empresas-espana-6033534
 * 248) http://www.straitstimes.com/world/organisations-hit-by-global-cyberattack
 * 249) http://www.elperiodico.com/es/noticias/sociedad/ataque-informatico-masivo-infecta-las-grandes-empresas-espana-6033534
 * 250) http://www.independent.co.uk/news/uk/home-news/nissan-sunderland-cyber-attack-ransomware-nhs-malware-wannacry-car-factory-a7733936.html
 * 251) https://www.blognone.com/node/92406
 * 252) https://www.facebook.com/th.bns/photos/a.184801638679603.1073741828.177204056106028/222434488249651/
 * 253) https://www.theguardian.com/society/2017/may/12/global-cyber-attack-nhs-trusts-malware
 * 254) https://www.ft.com/content/af74e3f4-373d-11e7-99bd-13beb0903fa3
 * 255) http://www.independent.co.uk/news/uk/home-news/nissan-sunderland-cyber-attack-ransomware-nhs-malware-wannacry-car-factory-a7733936.html
 * 256) http://www.nu.nl/internet/4691349/parkeerbedrijf-q-park-kampt-nog-steeds-met-ransomware-aanval.html?redirect=1
 * 257) http://www.nu.nl/131841/video/accu-laadt-elektrische-auto-in-vijf-minuten-op.html
 * 258) http://observador.pt/2017/05/12/portugal-telecom-alvo-de-ataque-informatico-internacional/
 * 259) http://observador.pt/2017/05/15/revelada-a-identidade-do-heroi-acidental-que-travou-ciberataque-com-10-euros/
 * 260) http://stirileprotv.ro/stiri/actualitate/atacul-informatic-global-ar-fi-afectat-si-uzina-dacia-de-la-mioveni-reactia-ministrului-comunicatiilor-augustin-jianu.html
 * 261) http://stirileprotv.ro/stiri/actualitate/liviu-dragnea-s-a-imbracat-in-costum-popular-pentru-a-contribui-la-intrarea-nasaudului-in-cartea-recordurilor-foto.html
 * 262) https://www.gizmodo.com.au/2017/05/todays-massive-ransomware-attack-was-mostly-preventable-heres-how-to-avoid-it/
 * 263) http://www.straitstimes.com/world/organisations-hit-by-global-cyberattack
 * 264) http://milano.repubblica.it/cronaca/2017/05/12/news/milano_virus_ransomware_universita_bicocca-165302056/
 * 265) http://www.wow.com/wiki/Cyber_attacks
 * 266) https://uk.news.yahoo.com/westminster-attack-funeral-held-romanian-woman-died-falling-133200693.html
 * 267) https://uk.news.yahoo.com/weirdest-election-ever-201719000.html
 * 268) https://uk.news.yahoo.com/corbyns-car-accidentally-runs-over-112258876.html
 * 269) https://uk.news.yahoo.com/north-korea-fires-missile-days-south-korea-leader-012518694.html
 * 270) http://observador.pt/2017/05/15/revelada-a-identidade-do-heroi-acidental-que-travou-ciberataque-com-10-euros/
 * 271) http://observador.pt/2017/05/12/portugal-telecom-alvo-de-ataque-informatico-internacional/
 * 272) http://www.nu.nl/internet/4691349/parkeerbedrijf-q-park-kampt-nog-steeds-met-ransomware-aanval.html?redirect=1
 * 273) https://www.timeanddate.com/time/zones/ist
 * 274) http://timesofindia.indiatimes.com/india/andhra-police-computers-hit-by-cyberattack/articleshow/58658853.cms
 * 275) https://en.wikipedia.org/wiki/2015_sandalwood_smugglers_encounter_in_Andhra_Pradesh
 * 276) http://timesofindia.indiatimes.com/india/andhra-police-computers-hit-by-cyberattack/articleshow/58658853.cms
 * 277) http://www.chicagotribune.com/news/local/breaking/ct-midlothian-hacker-ransom-met-20150220-story.html
 * 278) http://hvg.hu/tudomany/20170512_wannacry_zsarolovirus_aldozatok_magyar_ceg
 * 279) http://www.eltiempo.com/tecnosfera/novedades-tecnologia/alerta-por-cibertaque-que-golpeo-a-74-paises-87602
 * 280) http://www.france24.com/en/20170512-cyberattack-ransomware-renault-worldwide-british-hospitals
 * 281) http://www.faz.net/aktuell/wirtschaft/unternehmen/hacker-angriff-weltweite-cyberattacke-trifft-computer-der-deutschen-bahn-15013583.html
 * 282) http://www.wired.co.uk/article/wanna-decryptor-ransomware
 * 283) http://www.lawleyinsurance.com/cybersecurity-attack-landscape-2017/
 * 284) http://www.lawleyinsurance.com/business-insurance/paypal-apple-pay-google-wallet-understand-mobile-payments-risks-business/
 * 285) http://www.foxnews.com/tech/2017/05/12/cyber-attack-spreads-across-12-countries-some-uk-hospitals-crippled.html
 * 286) https://www.theguardian.com/politics/live/2017/may/14/general-election-2017-may-promises-homes-for-generation-rent-politics-live
 * 287) https://www.yahoo.com/tech/cyberattack-major-cyber-attacks-over-past-10-years-154337949.html
 * 288) https://www.wsj.com/articles/english-hospitals-hit-by-suspected-cyberattack-1494603884
 * 289) http://www.cbsnews.com/news/internet-disrupted-dyn-hit-by-ddos-cyberattack/
 * 290) http://www.nbcnews.com/news/world/national-health-service-cyberattack-hits-english-hospitals-hackers-demand-bitcoin-n758516
 * 291) https://en.wikipedia.org/wiki/2011_PlayStation_Network_outage
 * 292) https://www.playstation.com/en-gb/
 * 293) http://kotaku.com/5804318/welcome-back-psn-the-winners
 * 294) http://www.telegraph.co.uk/technology/sony/8476757/PlayStation-hack-top-five-data-thefts.html
 * 295) https://blog.us.playstation.com/2011/05/14/play-on-%E2%80%93-psn-restoration-begins-now/
 * 296) https://blog.us.playstation.com/2011/05/14/ps3-system-software-update/
 * 297) https://uk.news.yahoo.com/nhs-hit-major-cyber-attack-151621469.html
 * 298) https://finance.yahoo.com/news/global-cyber-attack-fuels-concern-214754533.html;_ylt=AwrBT9EgWRZZccwAf5xXNyoA;_ylu=X3oDMTByMjB0aG5zBGNvbG8DYmYxBHBvcwMxBHZ0aWQDBHNlYwNzYw--
 * 299) https://uk.news.yahoo.com/nhs-hit-major-cyber-attack-151621469.html
 * 300) https://www.theguardian.com/society/2017/may/12/hospitals-across-england-hit-by-large-scale-cyber-attack
 * 301) https://uk.yahoo.com/news/nhs-braces-weekend-chaos-cyberattack-045400386.html
 * 302) http://news.sky.com/story/live-cyberattack-fears-as-nhs-systems-go-down-10874343
 * 303) http://news.sky.com/story/biggest-ransomware-attack-in-history-targets-almost-100-countries-10874647
 * 304) http://news.sky.com/story/anatomy-of-a-hack-and-the-anonymous-hero-who-stopped-it-10875234
 * 305) http://www.nasdaq.com/article/global-cyberattack-disrupts-shipper-fedex-uk-health-system-20170512-00968/amp
 * 306) https://www.theguardian.com/technology/2017/may/12/global-cyber-attack-ransomware-nsa-uk-nhs
 * 307) https://www.theguardian.com/football/2017/may/12/chelsea-win-premier-league-title-west-bromwich-albion-match-report
 * 308) https://www.theguardian.com/technology/2017/may/12/global-cyber-attack-ransomware-nsa-uk-nhs
 * 309) https://www.theguardian.com/society/live/2017/may/12/england-hospitals-cyber-attack-nhs-live-updates
 * 310) http://news.sky.com/story/live-cyberattack-fears-as-nhs-systems-go-down-10874343
 * 311) https://www.theguardian.com/society/2017/may/12/hospitals-across-england-hit-by-large-scale-cyber-attack
 * 312) https://www.theguardian.com/us-news/2017/may/12/michelle-obama-trump-school-lunches-childhood-obesity
 * 313) http://www.nasdaq.com/article/global-cyberattack-disrupts-shipper-fedex-uk-health-system-20170512-00968/amp
 * 314) https://uk.news.yahoo.com/nhs-hit-major-cyber-attack-151621469.html
 * 315) http://itlaw.wikia.com/wiki/Computer_Virus_Attacks
 * 316) https://www.yahoo.com/tech/russias-interior-ministry-says-computers-hit-virus-attack-212133477.html
 * 317) https://www.investing.com/news/technology-news/suspected-russia-backed-hackers-target-baltic-energy-networks-483145
 * 318) https://www.bing.com/images/search?q=Reed
 * 319) http://abc7.com/archive/7659840/
 * 320) http://www.dailymail.co.uk/news/article-193396/Millions-hit-virus.html
 * 321) https://home.mcafee.com/virusinfo/global-virus-map?ctst=1
 * 322) https://cybermap.kaspersky.com/
 * 323) https://home.mcafee.com/VirusInfo/Threat-Activity
 * 324) https://www.usatoday.com/story/news/world/2017/03/15/cyber-attack-targets-major-twitter-accounts/99199366/
 * 325) http://timesofindia.indiatimes.com/world/uk/british-hospitals-say-hit-by-suspected-national-cyber-attack/articleshow/58647516.cms
 * 326) http://www.nato.int/docu/review/2013/Cyber/timeline/EN/index.htm
 * 327) http://www.zerohedge.com/news/2015-07-08/what-first-world-cyber-war-looks-global-real-time-cyber-attack-map
 * 328) http://www.nato.int/docu/review/2013/Cyber/timeline/EN/index.htm
 * 329) http://timesofindia.indiatimes.com/world/uk/british-hospitals-say-hit-by-suspected-national-cyber-attack/articleshow/58647516.cms
 * 330) https://www.theguardian.com/world/2017/jan/31/czech-cyber-attack-russia-suspected-of-hacking-diplomats-emails
 * 331) https://www.techopedia.com/definition/24748/cyberattack
 * 332) https://en.wikipedia.org/wiki/Cyber-attack
 * 333) http://www.hackmageddon.com/2015/08/10/july-2015-cyber-attacks-statistics/
 * 334) https://en.wikipedia.org/wiki/WannaCry
 * 335) https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2765010
 * 336) http://www.hackmageddon.com/2015/08/10/july-2015-cyber-attacks-statistics/
 * 337) https://www.forbes.com/sites/thomasbrewster/2017/05/12/nsa-exploit-used-by-wannacry-ransomware-in-global-explosion/#7aee0717e599
 * 338) http://www.bbc.co.uk/news/health-39899646
 * 339) https://www.theguardian.com/technology/2017/may/12/nhs-ransomware-cyber-attack-what-is-wanacrypt0r-20
 * 340) https://www.theguardian.com/technology/2017/may/12/nhs-ransomware-cyber-attack-what-is-wanacrypt0r-20
 * 341) https://www.theguardian.com/politics/2017/may/12/15m-oldsters-in-their-graves-could-swing-second-eu-vote-says-ian-mcewan
 * 342) https://www.theguardian.com/us-news/2017/may/12/donald-trump-threatens-james-comey-fbi-tapes
 * 343) https://www.theguardian.com/society/2017/may/12/hospitals-across-england-hit-by-large-scale-cyber-attack
 * 344) https://digital.nhs.uk/article/1491/Statement-on-reported-NHS-cyber-attack
 * 345) https://motherboard.vice.com/en_us/article/a-massive-ransomware-explosion-is-hitting-targets-all-over-the-world
 * 346) http://www.bbc.co.uk/news/uk-england-humber-37863949
 * 347) http://thelincolnite.co.uk/2016/11/delays-still-expected-at-lincolnshire-hospitals-cyber-attack/
 * 348) https://www.scmagazineuk.com/updated-ransomware-attack-on-40-nhs-trusts-all-over-the-uk/article/658864/
 * 349) http://thelincolnite.co.uk/2016/11/delays-still-expected-at-lincolnshire-hospitals-cyber-attack/
 * 350) http://www.bbc.co.uk/news/live/uk-england-lincolnshire-37833078
 * 351) https://www.scmagazineuk.com/breaking-nhs-trust-crippled-by-cyberattack/article/570117/
 * 352) http://www.lincolnshirelive.co.uk/disruption-for-patients-as-systems-go-down-at-lincoln-county-hospital-after-massive-nhs-cyber-attack/story-30329254-detail/story.html
 * 353) https://www.pressandjournal.co.uk/fp/news/aberdeen/828084/nhs-grampian-faces-outbreak-of-cyber-attacks/
 * 354) https://www.theguardian.com/technology/2017/may/12/nhs-ransomware-cyber-attack-what-is-wanacrypt0r-20
 * 355) http://www.desinerd.co.in/wannacry-ransomware-hits-spain-italy-portugal-russia-and-ukraine/
 * 356) https://twitter.com/JakubKroustek/status/863045197663490053
 * 357) https://www.telefonica.com/es
 * 358) https://www.telefonica.com/es/web/shareholders-investors/calendario?p_p_id=122_INSTANCE_WlzkF2O3JKJf&p_p_lifecycle=0&p_p_state=normal&p_p_mode=view&p_p_col_id=_118_INSTANCE_pJnMvwVf6Mbn__column-2&p_p_col_count=1&p_r_p_564233524_resetCur=true&p_r_p_564233524_categoryId=123453735%2C311118
 * 359) http://www.nhs.uk/pages/home.aspx
 * 360) https://twitter.com/nhs
 * 361) http://www.nhsonline.org/
 * 362) https://uk.news.yahoo.com/u-k-national-health-hit-153708430.html
 * 363) https://www.theguardian.com/society/2017/may/12/hospitals-across-england-hit-by-large-scale-cyber-attack
 * 364) https://www.theguardian.com/world/2017/may/12/popularity-of-sushi-has-brought-rise-in-parasitic-infections-warn-doctors-anisakiasis
 * 365) https://www.theguardian.com/politics/live/2017/may/12/general-election-2017-no-more-handholding-trump-corbyn-politics-live
 * 366) http://www.ibtimes.co.uk/telefonica-hack-ransomware-attack-internal-network-forces-computer-shut-down-1621350?utm_source=yahoo&utm_medium=referral&utm_campaign=rss-related&utm_content=/rss/yahoous/news
 * 367) http://www.ibtimes.co.uk/nhs-cyberattack-ransomware-assault-paralyses-uk-hospitals-putting-thousands-risk-1621375
 * 368) http://www.bbc.co.uk/news/health-37186455
 * 369) http://www.bbc.co.uk/news/health-39899646
 * 370) http://www.bbc.co.uk/news/world-europe-39870460
 * 371) https://www.theguardian.com/society/2017/may/12/hospitals-across-england-hit-by-large-scale-cyber-attack
 * 372) https://uk.news.yahoo.com/telef-nica-hack-ransomware-attack-131624307.html
 * 373) http://ex.ibt.uk/tv/promotion?utm_source=ibtimes&utm_campaign=ibtuk&utm_medium=IBT
 * 374) http://www.ibtimes.co.uk/3d-printing-future-f1-racing-1615985
 * 375) https://finance.yahoo.com/news/spanish-companies-hit-ransomware-cyber-132052215.html
 * 376) http://www.bbc.co.uk/news/health-39899646
 * 377) https://www.theguardian.com/society/2017/may/12/hospitals-across-england-hit-by-large-scale-cyber-attack
 * 378) https://teiss.co.uk/2017/05/12/telefonica-ransomware-attack-employees-asked-pull-plug-computers/
 * 379) http://www.bbc.co.uk/news/health-39899646
 * 380) https://www.nytimes.com/2016/12/14/technology/yahoo-hack.html?_r=0
 * 381) http://www.bbc.com/news/technology-38934822
 * 382) http://www.zdnet.com/article/nomx-the-most-secure-email-service-can-be-easily-hacked/
 * 383) https://www.infosecurity-magazine.com/news/nomx-researchers-defend-unfair-test/
 * 384) https://www.scmagazineuk.com/updated-nomx-secure-email-server-challenged-by-british-researchers/article/653222/
 * 385) http://www.msn.com/en-sg/money/technology/massive-cyber-attack-grinds-liberias-internet-to-a-halt/ar-AAjSeBP
 * 386) http://www.telegraph.co.uk/technology/2016/11/04/unprecedented-cyber-attack-takes-liberias-entire-internet-down/
 * 387) https://www.theguardian.com/technology/2016/nov/03/cyberattack-internet-liberia-ddos-hack-botnet
 * 388) http://www.telegraph.co.uk/technology/2016/11/04/how-a-cyber-attack-could-sabotage-the-us-election/
 * 389) http://europe.newsweek.com/hackers-take-down-liberias-internet-series-cyberattacks-517141?rm=eu
 * 390) http://www.telegraph.co.uk/technology/2016/11/04/how-a-cyber-attack-could-sabotage-the-us-election/
 * 391) http://www.rappler.com/technology/news/151338-cyber-attack-disrupts-internet-liberia
 * 392) http://www.nst.com.my/news/2016/11/186023/huge-cyber-attack-disupts-internet-liberia
 * 393) http://themarketghana.com/news/technology/12784/Massive_CyberAttack_Grinds_Liberias_Internet
 * 394) https://amp.theguardian.com/technology/2016/oct/22/cyber-attack-hackers-weaponised-everyday-devices-with-malware-to-mount-assault
 * 395) https://www.cnbc.com/amp/2016/10/21/major-websites-across-east-coast-knocked-out-in-apparent-ddos-attack.html
 * 396) http://www.onenewspage.com/video/20161021/5839140/FBI-Is-Investigation-Cyber-Attack-on-Internet-Infrastructure.htm
 * 397) http://www.41nbc.com/2016/10/24/cyber-attacks-now-closer-to-your-home-than-ever/
 * 398) http://finance.yahoo.com/news/companies-urged-multiple-vendors-wake-014037572.html;_ylt=AwrBT9YN.w1Yq.gA02NXNyoA;_ylu=X3oDMTEyaHZjYzhtBGNvbG8DYmYxBHBvcwMxBHZ0aWQDQjE4NzlfMQRzZWMDc2M-
 * 399) http://www.nbcnews.com/tech/security/amp/internet-outage-shows-how-sophisticated-attacks-can-target-your-home-n671561
 * 400) https://www.yahoo.com/tech/twitter-spotify-disrupted-internet-provider-reports-attack-131047632.html
 * 401) http://www.pcmag.com/article2/0,2817,2396611,00.asp
 * 402) http://www.theregister.co.uk/2014/08/27/nowegian_oil_hack_campaign/
 * 403) https://nakedsecurity.sophos.com/2014/08/28/massive-cyber-attack-on-oil-and-energy-industry-in-norway/
 * 404) http://www.scmagazineuk.com/hundreds-of-norwegian-energy-companies-hit-by-cyber-attacks/article/368539/
 * 405) http://www.csoonline.com/article/2599258/cyber-attacks-espionage/50-norweigian-oil-companies-suffer-cyber-attack.html
 * 406) http://www.digitaljournal.com/internet/anonymous-norway-claim-massive-cyber-attack-on-norwegian-banks/article/389030
 * 407) https://www.yahoo.com/tech/twitter-netflix-slow-return-reported-163619988.html
 * 408) http://www.thenational.ae/uae/technology/uae-is-vulnerable-to-cyber-attacks
 * 409) https://www.yahoo.com/tech/twitter-spotify-disrupted-internet-provider-reports-attack-131047632.html
 * 410) http://baltimore.cbslocal.com/2016/10/22/cyber-attack-affects-major-websites-culprit-still-to-be-named/
 * 411) https://www.yahoo.com/tech/twitter-spotify-disrupted-internet-provider-reports-attack-131047632.html
 * 412) http://baltimore.cbslocal.com/2016/10/22/cyber-attack-affects-major-websites-culprit-still-to-be-named/
 * 413) http://www.foxnews.com/tech/2016/10/21/major-disruptions-online-as-cyber-attack-hits-internet-services-company.html
 * 414) http://baltimore.cbslocal.com/2016/10/23/baltimore-city-officer-does-the-juju-on-that-beat-dance/?e=mPHwhqydQAK1LA
 * 415) http://baltimore.cbslocal.com/2016/10/21/big-questions-after-cyber-attacks-cripple-east-coast/?e=lKbN-K*JDwCUXw
 * 416) http://baltimore.cbslocal.com/2016/10/21/naval-academy-to-break-ground-for-new-cybersecurity-building/?e=lKbN-K*JDwH4RQ
 * 417) https://www.ready.gov/cyber-attack
 * 418) https://www2.fireeye.com/PPC-security-predictions-for-2016-threat-research.html?utm_source=google&utm_medium=Security_Predictions_2016&utm_keyword=cyberattacks&utm_campaign=General
 * 419) http://www.nbcnews.com/tech/security/cyber-attack-power-grid-could-cost-1-trillion-report-n388581
 * 420) https://www.yahoo.com/tech/twitter-spotify-disrupted-internet-provider-reports-attack-131047632.html
 * 421) http://www.reuters.com/article/us-usa-cyber-idUSKCN12L1ME
 * 422) https://www.yahoo.com/tech/twitter-spotify-disrupted-internet-provider-reports-attack-131047632.html
 * 423) https://en.wikipedia.org/wiki/Dyn_(company)
 * 424) https://en.wikipedia.org/wiki/Dyn_(company)#Distributed-Denial-of-Service_attack
 * 425) http://www.tech.com.pk/2016/10/waves-cyber-attacks-hit-netflix-spotify-twitter.html
 * 426) http://www.bbc.co.uk/news/technology-37728015
 * 427) https://krebsonsecurity.com/2016/10/ddos-on-dyn-impacts-twitter-spotify-reddit/
 * 428) http://www.theverge.com/2016/10/21/13362354/dyn-dns-ddos-attack-cause-outage-status-explained
 * 429) http://www.informationsecuritybuzz.com/hacker-news/__trashed-2/
 * 430) http://europe.newsweek.com/hackers-take-down-liberias-internet-series-cyberattacks-517141?rm=eu
 * 431) https://en.wikipedia.org/wiki/Zeus_(malware)
 * 432) https://malwaretips.com/blogs/zeus-trojan-virus/
 * 433) http://www.reuters.com/article/us-internet-attack-idUSN1638118020070717
 * 434) https://www.organicfacts.net/running-weight-loss.html?utm_source=onesignal20jun17
 * 435) https://www.yahoo.com/news/driver-plows-crowd-outside-london-102245091.html?soc_trk=gcm&soc_src=1edaf5ad-f8e3-33a4-ab91-3935dbff04a7&.tsrc=notification-brknews
 * 436) http://www.bbc.co.uk/news/technology-37859678
 * 437) https://krebsonsecurity.com/2016/11/did-the-mirai-botnet-really-take-liberia-offline/
 * 438) http://www.information-age.com/liberias-internet-hacked-123463064/
 * 439) http://www.myrtlebeachonline.com/news/nation-world/world/article112624328.html
 * 440) https://metroble.com/news/no-hackers-apparently-didnt-take-down-the-entire-liberian-internet#.WCrIfhqLTcs
 * 441) https://www.theguardian.com/technology/2016/nov/03/cyberattack-internet-liberia-ddos-hack-botnet
 * 442) http://www.bbc.co.uk/news/technology-37859678
 * 443) https://krebsonsecurity.com/2016/11/did-the-mirai-botnet-really-take-liberia-offline/
 * 444) http://allafrica.com/stories/201611081145.html
 * 445) https://fronteranews.com/news/africa/kenya-fears-an-even-bigger-cyber-attack-is-coming/