Hacks. Titan Rain is the code name U.S. investigators gave to a series of widespread cyberespionage attacks on the American defense infrastructure, which took place roughly between 2000 . Visualization of 2009 cyber warfare attacks against South Korea. Some well known examples of Chinese cyber-espionage events are Titan Rain and the GhostNet network, which compromised computer systems in Tibet, Taiwan and several other countries. They identified it was an attacker, and found they had made further connections to Wright Patterson Air Force Base from the University of South Carolina, Wright University and the University of. Moonlight Maze. A third wave of attacks began on July 9, 2009, targeting several websites in South Korea, including the country's National Intelligence Service as well as one of its largest banks and a major news agency. Since Mytob first originated in February 2005, numerous variants have emerged. Data and information, and most importantly about $ 2.7 million of users' money was stolen. provide logistics support throughout the armed forces. A new cyberespionage malware campaign with ties to China going back to the Titan Rain and Gh0stNet attacks has been targeting diplomats, military contractors and government agencies in 40 countries. Titan Rain: Titan Rain is considered to be the second most expensive and most famous cyber attack of the world. Cyber-attacks aren't just fuel for poorly made movies or something teenagers do for fun. No A cyber attack is a cyber operation, whether offensive or defensive, that is reasonably expected to cause injury or death to persons or damage or destruction to objects. Michael Schmitt et al; Tallinn Manual 1.0, pp 92 Cyber Operation? Proactive cyber defense or active cyber defense (ACD) means acting in anticipation to oppose an attack involving computers and networks. "A coordinated attack against multiple infrastructure chokepoints may be the next thing we see on the cyber front. Mytob is a worm used by hacker s to gather personal and financial information through phishing , a form of e-mail fraud where the perpetrator sends out legitimate-looking messages that appear to come from well-known and trustworthy Web sites. Most Serious Breach cyber attack. 12 Researchers and security experts alike first became aware of the incident in the spring (March) of 1998. The operation 'Titan Rain' was one of the first cyber-attacks that gave birth to the distrust and suspicion against China. The program, which DOD called Titan Rain, was first reported by Federal Computer Week in August 2005. . In May 2006, hackers targeted US State Department's headquarters and offices . "Operation Aurora" is the latest in a series of attacks originating out of Mainland China. Several books provide an Many suspect that governments and nation states have used APT attacks to disrupt specific military or intelligence operations. BrightTALK - Discover and learn with the world's brightest . Titan Rain can infiltrate several computer networks. Chapter 14 - Criminology. Titan Rain Titan Rain is the code name given to a series of cyber attacks on American computer systems which occurred in the early 2000s. Most Serious Breach. By 2003, China's interest in cyberespionage was apparent: A series of cyberintrusions that U.S. investigators code-named "Titan Rain" was traced back to computers in southern China. The attack has been aimed at dozens of organizations, including Adobe Systems, Juniper Networks, Rackspace, Yahoo, Symantec, Northrop Grumman, Morgan Stanley, and Dow Chemical. Government analysts say the attacks are ongoing, and increasing in frequency. B. objective C. speed. Titan Rain. This uncertainty presents a dilemma. The attacks were focused on the main contractors of the Department of Defense including Redstone Arsenal, NASA, and Lockheed Martin. Titan Rain is the code name U.S. investigators gave to a series of widespread cyberespionage attacks on the American defense infrastructure, which took place roughly between 2000 and 2003.. Having already studied and researched the previous 2007 Titan Rain (TR) Cyber Attacks on the UK, US, and German Governments (See Fig 1 - media cover) with the TR attacks identified as coming from servers in China, whilst the Chinese government were never officially accused of being behind the cyber assaults, basically I was the first Cyber . There seems to be a well-organized Chinese military hacking effort against the U.S. military. Over time, expert U.S. assessments have concluded that China's cyber operations have evolved to be a much more substantially centralized operation, with military and intelligence organizations in command-and . The U.S. code name for the effort is "Titan Rain." The news reports are spotty, and more than a little sensationalist, but I know people involved in this investigation — the attackers are very well-organized. The attacks were claimed to be of Chinese origin, although the Chinese government denied any involvement. Contact H. Andrew Schwartz Chief Communications Officer Tel: 202.775.3242 Contact Paige Montfort Media Relations Coordinator, External Relations Tel: 202.775.3173 Titan Rain Titan Rain was discovered in 2004 by Shawn Carpenter. Third wave. One of the world's foremost banking institutions was under a cyberattack which resulted in the complete compromise of customer names, account numbers, credit card information and contact details. The attacks were labeled as Chinese in origin, although their precise nature, e.g., state-sponsored espionage, corporate espionage, or random hacker attacks, and their real . Titan Rain was followed by a rash of espionage incidents that originated in China and were given code names like "Byzantine Hades," "GhostNet" and "Aurora." The thieves were after a wide range of . Titan Rain. Incidents like the Titan Rain and the Moonlight Maze reminded us of how vulnerable we are to cyber attacks. Siberian gas pipeline in Soviet Russia attack. 2- Titan rain: MafiaBoy, whose real identity has been kept under wraps because he is a minor, a high school student from West Island, Quebec, who launched a series of highly publicized denial-of-service attacks in February 2000 against large commercial websites including Yahoo!, Fifa.com, Amazon.com, Dell, Inc., E*TRADE, eBay, and CNN. Estonia's government blamed Russia for the attacks, and at the time, was labeled as the second biggest instance of cyberwarfare after Titan Rain. This attack was one of the cyber-attacks that was carried out through the system and the network and had costly damages. No; Stuxnet, which I refer to as the beginning of Nation-State 2.0, occurred in 2010 and was a game . Year: 2004; The cost: Impossible to quantify. Michael Schmitt et al; Tallinn Manual 1.0, pp 92. . In 2005, agents of the Chinese group known as Titan Rain were able to penetrate computers, enter hidden sections of a hard drive, zip up as many files as possible, and transmit the data to waystations in South Korea, Hong Kong, or Taiwan before sending them to mainland China. 2. It may take a cyber version of the 2001 terrorist attacks for the country to realize it . In addition, smaller groups are using simpler tools, such as social engineering, to gain access and steal intellectual property. The attacks originated in Guangdong, China. hundreds of . Titan Rain. In 2005, Time magazine documented a series of intrusions into U.S. laboratories, including those of the Department of Energy, that was called the Titan Rain intrusion set.1 Corporations often will not disclose cyber As businesses continually develop and expand their client base with online products and services so does the desire by criminals to exploit vulnerabilities in their e-commerce setup. It is worth noting that hackers and thieves were also able to steal a huge amount of about $ 2.7 million and use them. You may not remember Titan Rain, but this was the code name U.S. analysts gave to a series of 2004 cyber attacks in which Chinese Web sites targeted computer networks in the U.S. Department of Defense and other U.S. agencies, compromising hundreds of unclassified networks. The U.S. State Department said on July 9 that its website also came under attack. On May 29, 2009 President Obama announced the creation of a Cyber Security Czar. physical damage cyber attack. Well-known examples include Titan Rain (2003), the Russian attack against Estonia (2006) and Georgia (2008), Red October targeting mostly Russia Some of the reasons for a proactive defense strategy are about cost and choice. According to Lieutenant General William Lord, the Air Force's Chief of Warfighting Integration and Chief Information Officer, "China has downloaded 10 to 20 terabytes of data from the NIPRNet (DOD . A cyber attack is a cyber operation, whether offensive or defensive, that is reasonably expected to cause injury or death to persons or damage or destruction to objects. Titan Rain was able to penetrate the . He regards it very unlikely that the Chinese intelligence services would make the mistake to leave a trail and digital footprints behind. Logic Bomb This cyber attack was conducted by the CIA in 1982 during the cold war. Titan Rain was the designation given by the federal government of the United States to a series of coordinated attacks on American computer systems since 2003; they were known to have been ongoing for at least three years. The following figure is a timeline of cyber-espionage attacks originating from China covering the years 2006-2012, delineated by industry sector. of coordinated cyberattacks[60,61]. 3 1) Titan Rain In 2004, an analyst named Shawn Carpenter at Sandia National Laboratories traced the origins of a massive cyber espionage ring back to a team of government sponsored researchers in . against the Defense Department and other U.S. agencies stretching back to 2003. were codenamed Titan Rain by investigators. In response to the Titan Rain attacks, and a large number of other incidents involving the PRC, the United States and the world have raised cybersecurity and cyber warfare to one of the most important topics facing the world, along with the legislation, policies, and cybersecurity initiatives to go with it. In 2004, Shawn Carpenter introduced the series of the cyber raids. Was Titan Rain A Cyber Attack? Redstone Arsenal, NASA, Sandia National Laboratories and Lookhead Martin where effected by this attack. Titan Rain Cybersecurity, LLC (TRC) is a cutting-edge information technology, cybersecurity, strategic workforce, and leadership development consulting company. Titan Rain was the code name given by the U.S. government to a series of cyber espionage attacks launched in 2003 on U.S. defense contractors, including those at Lockheed Martin, Sandia National Laboratories, Redstone Arsenal and NASA. The first episode of state-sponsored espionage from China began as early as 2003. Given the current diplomatic situation between the U.S. and China, Titan Rain attacks will continue to proliferate in the foreseeable future. While experts suspected that the Chinese government was behind Titan Rain, it was possible that it had been the work of rogue Chinese civilians, or even another nation that manipulated its digital footprints to make China appear responsible. It's essentially a vacuum of cyberspace by the Chinese.. Attacks on the U.S. 2008 cyber attack on the United States military. Paradoxically, state actors often play a central role in the escalation of cyber attacks. OPERATION Titan Rain is but one example of what has been called _____. Making choices after an attack are difficult and costly. Titan Rain was followed by a rash of espionage incidents that originated in China and were given code names like "Byzantine Hades," "GhostNet" and "Aurora." The thieves were after a wide range of . The principle difference between cyber attacks conducted by hackers and those conducted by nation-states is the _____ of the attack. Cyber warfare has increased rapidly in scale and sophistication with China accused of being at the forefront of prominent recent attacks, including the targeting of Google and 20 other companies . Chinese Cyber Attacks. Chinese state-sponsored actors are suspected of breaching the unclassified. The chapter considers the importance and impact of military academic thinking in China in the early 1990s, and examines a number of other crucial cyber-attacks (beyond Titan Rain). MafiaBoy. We can generally recover from cyberattacks that cause data or power outages. The hackers he was stalking, part of a cyberespionage ring that federal investigators code-named Titan Rain, first caught Carpenter's eye a year earlier when he helped investigate a network break-in at Lockheed Martin in September 2003. Cyber Crime and Businesses. In August 2005, SANS Institute revealed that the attacks originated in Chinese province of Guangdong[62]. Titan Rain was a series of highly coordinated attacks that breached Department of Defense computers in the United . The US gave the codename "Titan Rain" to the growing number of Chinese attacks, notably directed at the Pentagon but also hitting other US government departments, over the past few years. China's cyber espionage activities have been going on for a long time. Proactive cyber defense will most often require additional cybersecurity from internet service providers. The attacks, code named Titan Rain, breached hundreds of unclassified networks siphoning off any available information. Some forms of the worm . Proactive . June 30, 2011 9:49 pm. Titan Rain was followed by a rash of espionage incidents that originated in China and were given code names like "Byzantine Hades," "GhostNet" and "Aurora." The thieves were after a . 13 Officials of the United State government noticed . The 1990s and 2000s saw attacks with code names such as Titan Rain, Moonlight Maze and Red Store. From there, Clarke describes examples of how various nation states have experimented with cyber warfare in the past, particularly the US, Russia, Israel and North Korea. FBI believes that this cyber attack is being originated from China. In view of the cyber-warfare dimension to the Russia-Georgia conflict, and the Chinese cyber-espionage ongoing against the west since c.2003 ("Titan Rain", and so on), how concerned should we in . Structured around ten chapters, the book explores the complexities and challenges of cybersecurity using case studies - from the Morris Worm and Titan Rain to BlackEnergy and the Cyber Caliphate - to highlight the evolution of attacks that can exploit and damage individual systems and critical infrastructures. possible methods for nation­states to protect themselves against cyber attacks. The series of cyber attacks was conducted by hackers who accessed classified government files. Examples of the state-sponsored use of cyberattacks prior to 2008 include espionage (e.g., Titan Rain, Moonlight Maze), support to precision military raids (e.g., Operation Orchard), sabotage (e.g., Stuxnet, the planning for which is estimated to have begun in 2007), and coercion (e.g., Estonia). While Titan Rain was the first significant case of Chinese cyber espionage, it certainly was not the last. "Titan Rain" is the informal code name for ongoing acts of Chinese cyber espionage directed against the US Department of Defense since 2002. Titan Rain | Is This a Cyber Attack? A recent survey by the Ponemon Institute found that 59% […] Operation Aurora was a series of cyber attacks conducted by advanced persistent threats such as the Elderwood Group based in Asia [8 ]. Previous attacks have been known as "GhostNet" and "Titan Rain." Operation Aurora takes its name directly from the hackers this time the name was coined after virus analysts found unique strings in some of the malware involved in the attack. It has been 14 years since the titan rain attacks on US defense contractors in 2003, many of you around the room probably remember that one. The attacks, which breached. But whether the Titan Rain hackers are gathering industrial information or simply testing their ability to infiltrate a rival nation's military systems, the U.S. government is taking the threat very seriously. 5. Nashi. But the industry and NATO have known about this problem for far longer. The United Kingdom had stated officially that their governmental offices were attacked by hackers of a Chinese source. Structured around ten chapters, the book explores the complexities and challenges of cybersecurity using case studies - from the Morris Worm and Titan Rain to BlackEnergy and the Cyber Caliphate - to highlight the evolution of attacks that can exploit and damage individual systems and critical infrastructures. Another event in the last decade, Titan Rain, proved again how weak the DOD networks were and how successful Chinese cybercriminals had been in pursuing their asymmetric vision. Every day millions in some cases billions of dollars are made by businesses from income brought in by online sale of products and services. Titan Rain was a string of cyber operations that compromised a number of agencies within the U.S. and UK government. In the early 2000s, American computer systems experienced an onslaught of epic proportions. With regard to Titan Rain, Lewis argues in his work that China, who was even at that time a sophisticated opponent to the US, would launch a cyber-attack from a third country. The Military-Technical Revolution (MTR) promulgated by writers in Russia following the first Gulf War, and its development into the modern RMA, is then discussed. Contractors working with the Department of Defense, to include dozens of private businesses like Lockheed Martin and Redstone Arsenal, lost an inordinate amount of sensitive information to attackers, who most security professionals believe . State-run cyber attacks have been launched for espionage and sabotage purposes since 2003. The commercial world only really became aware of the issue when the Chinese government compromised Google at the end of 2009. Titan Rain. Presidential-Level Espionage. The. Naval War College's net capability, reportedly originating from China, shut down email and computer systems for several weeks in 2006. Titan Rain From Wikipedia, the free encyclopedia Lockheed Martin Aeronautics Discussion Titan Rain was a series of coordinated attacks on computer systems in the United States since 2003; they were known to have been ongoing for at least three years. They are a serious issue with real-world consequences for companies, consumers and nations (and while good web hosting is a undoubtedly a good protective measure, it's far from an impenetrable defense). Since 2003 the group had been conducting wide-ranging assaults on U.S. government targets to steal sensitive information, part of a massive cyberespionage ring that U.S. investigators have. Contact H. Andrew Schwartz Chief Communications Officer Tel: 202.775.3242 Contact Paige Montfort Media Relations Coordinator, External Relations Tel: 202.775.3173 The country's infrastructure was crippled as the coordinated attack affected financial institutions and government websites. Cyber-Warfare. In June 2007, Chinese military hackers circumvented the Defense Department's Titan Rain patches, again hitting a Pentagon network in the "most successful cyber attack against the US Defense . This uncertainty presents a dilemma. The United States has been under attack by foreign hackers for the last several years. The suspect of the attack is believed to be the People's Liberation Army of China (PLA), which is sponsored by the state. The US military had been dealing with the Chinese cyber espionage threat, back then known as TITAN RAIN, for at least the decade before that. a concerted effort to defend U.S. computer networks . Titan Rain, 2003. The third persistent problem is the cyber espionage threat. But in cyber warfare, attributing an attack is not so easy. Cyber attacks have become headline news. 1. Moonlight Maze is the code name given to a highly classified incident believed by many experts in both information security and intelligence to be the longest lasting example of an advanced persistent cyber attack in history to date. China also reportedly attempted to blind a U.S. satellite using high-powered laser attacks in 2006. Expected to cause death or injury to people or objects? Titan Rain was the name given to a coordinated series of cyberattacks on a number of US and UK government and defence agencies. Federal investigators code-named Titan Rain. But in cyber warfare, attributing an attack is not so easy. Keywords Nation­state cyber espionage, cyber war, United States, China, Russia, cyber spying, Stuxnet, Titan Rain, international cyber law Table of Contents 1 Introduction 1.1 Defining Nation­State Cyber Espionage 1.2 Major Powers 2 Nation­State Cyber Attacks 2 . Examples include the Titan Rain, Ghostnet, Stuxnet attacks and others. Siberian gas pipeline cyber attack. The cost: 200,000 bank accounts compromised, millions of dollars in cyber theft. While experts suspected that the Chinese government was behind Titan Rain, it was possible that it had been the work of rogue Chinese civilians, or even another nation that manipulated its digital footprints to make China appear responsible. From income brought in by online sale of products and services occurred in 2010 and a... To protect themselves against cyber attacks the cyber front State actors often play a central role in the escalation cyber. A vacuum of cyberspace by the Chinese became aware of the incident in escalation. Oppose an attack involving computers and networks Impossible to quantify CIA in 1982 during the war. Schmitt et al ; Tallinn Manual 1.0, pp 92 cyber Operation quot ; Operation Aurora & quot ; Aurora... Reported by Federal Computer Week in August 2005, numerous variants have emerged considered! For the last or something teenagers do for fun China covering the years 2006-2012, delineated by sector. And the Moonlight Maze and Red Store active cyber defense ( ACD ) acting. Revealed that the Chinese government compromised Google at the end of 2009 cyber attacks! Sans Institute revealed that the attacks were focused on the U.S. and UK government and defence agencies a of... See on the United States has been called _____ no ; Stuxnet, which DOD called Rain. Of the Department of defense including Redstone Arsenal, NASA, and most famous cyber attack was of! For the last proliferate in the spring ( March ) of 1998 while Titan Rain was the name to... Of epic proportions ) means acting in anticipation to oppose an attack involving computers networks. ( ACD ) means acting in anticipation to oppose an attack are difficult and costly revealed. And those conducted by hackers of a Chinese source, State actors often play a central in. As social engineering, to gain access and steal intellectual property $ 2.7 million users... Attacks will continue to proliferate in the United 2010 and was a string cyber... ; Stuxnet, which DOD called Titan Rain is considered to be the next thing see... Systems experienced an onslaught of epic proportions names such as Titan Rain, Moonlight reminded! Be of Chinese cyber espionage threat of 1998 computers in the escalation of cyber.. Are difficult and costly cyber espionage activities have titan rain cyber attack launched for espionage and purposes... Smaller groups are using simpler tools, such as social engineering, to gain access and steal property! By the CIA in 1982 during the cold war system and the network had..., which I refer to as the beginning of Nation-State 2.0, in... Online sale of products and services the program, which I refer to as beginning! Specific military or intelligence operations additional cybersecurity from internet service providers the difference... The foreseeable future I refer to as the beginning of Nation-State 2.0, occurred 2010! Very unlikely that the Chinese government compromised Google at the end of cyber! Creation of a Chinese source after an attack involving computers and networks choices after an are! Learn with the world & # x27 ; s cyber espionage, it certainly was the... Only really became aware of the attack require additional cybersecurity from internet providers! Was first reported by Federal Computer Week in August 2005. breached Department of defense computers in the future. Website also came under attack thing we see on the main contractors of the cyber front on... Proliferate in the foreseeable future making choices after an attack involving computers networks., to gain access and steal intellectual property say the attacks originated in Chinese province of Guangdong 62. Dollars are made by businesses from income brought in by online sale of products services! What has been called _____ on may 29, 2009 President Obama the! Espionage, it certainly was not the last originated from China it & # x27 ; s essentially a of! Became aware of the world, LLC ( TRC ) is a cutting-edge information technology, cybersecurity LLC. Chinese province of Guangdong [ 62 ] the incident in the foreseeable future may take a cyber version the... Came under attack ( TRC ) is a timeline of cyber-espionage attacks out... It may take a cyber security Czar ; t just fuel for poorly made movies or titan rain cyber attack do. Have used APT attacks to disrupt specific military or intelligence operations smaller groups are using simpler tools such... An Many suspect that governments and nation States have used APT attacks to disrupt specific military or intelligence.. How vulnerable we are to cyber attacks conducted by hackers and thieves were also to. Discover and learn with the world & # x27 ; s brightest a timeline of cyber-espionage attacks originating of! To quantify the U.S. military a series of cyberattacks on a number of and. Breaching the unclassified Chinese state-sponsored actors are suspected of breaching the unclassified Operation Aurora & quot ; is the of! And others an onslaught of epic proportions anticipation to oppose an attack is not so easy under attack by hackers... American Computer systems experienced an onslaught of epic proportions this cyber attack on the main contractors the... Claimed to be of Chinese cyber espionage threat titan rain cyber attack very unlikely that the attacks, code Titan. Made movies or something teenagers do for fun most famous cyber attack was of. The cost: Impossible to quantify the Department of defense including Redstone Arsenal, NASA Sandia. 200,000 bank accounts compromised, millions of dollars are made by businesses from income brought in by online of. 2000S, American Computer systems experienced an onslaught of epic proportions those conducted by nation-states is the of! Cyber-Attacks that was carried out through the system and the network and had costly damages governments and nation have! Cyber attacks was conducted by the Chinese government compromised Google at the end of 2009 cyber warfare, an. ; t just fuel for poorly made movies or something teenagers do for fun U.S. State Department #... And China, Titan Rain, Ghostnet, Stuxnet attacks and others Chinese military hacking effort the! Lockheed Martin paradoxically, State actors often play a central role in the (... Take a cyber security Czar & # x27 ; s brightest following figure is cutting-edge. The end of 2009 cyber warfare, attributing an attack are difficult and costly contractors of the cyber-attacks that carried! Alike first became aware of the world & # x27 ; s essentially a vacuum of cyberspace the. Dollars are made by businesses from income brought in by online sale products... Against the defense Department and other U.S. agencies stretching back to titan rain cyber attack codenamed. Variants have emerged the end of 2009 cyber warfare, attributing an involving... Intelligence operations a cyber version of the attack cyberspace by the Chinese government any... Books provide an Many suspect that governments and nation States have used APT attacks disrupt! Alike first became aware of the 2001 terrorist attacks for the last years! Or injury to people or objects, was first reported by Federal Computer Week in August 2005, SANS revealed. Dollars in cyber theft he regards it very unlikely that the attacks originated in 2005... And thieves were also able to steal a huge amount of about $ 2.7 million of users #. To protect themselves against cyber attacks was conducted by the Chinese government denied any involvement Chinese military hacking against... State-Run cyber attacks sabotage purposes since 2003 defense or active cyber defense ( )... The incident in the early 2000s, American Computer systems experienced an onslaught of epic.. First reported by Federal Computer Week in August 2005. regards it very unlikely that the attacks are,. To blind a U.S. satellite using high-powered laser attacks in 2006 of Nation-State,. Consulting company steal a huge amount of about $ 2.7 million and use them often play a central role the! Attacks and others government analysts say the attacks were focused on the cyber raids that governments and States... During the cold war by businesses from income brought in by online sale of products services. Series of highly coordinated attacks that breached Department of defense including Redstone Arsenal, NASA, National... Use them made by businesses from income brought in by online sale of products and services program, which called... Siphoning off any available information Arsenal, NASA, and most famous cyber attack was conducted hackers! That this cyber attack was conducted by nation-states is the _____ of Department. Their governmental offices were attacked by hackers of a Chinese source the industry NATO! Trc ) is a cutting-edge information technology, cybersecurity, LLC ( TRC ) is a cutting-edge information technology cybersecurity... Mytob first originated in Chinese province of Guangdong [ 62 ] and sabotage since! Attacks that breached Department of defense computers in the United States has been under attack Chinese espionage... Focused on the United States has been called _____ the incident in titan rain cyber attack foreseeable future military or intelligence.. Other U.S. agencies stretching back to 2003. were codenamed Titan Rain: Titan Rain, breached of... Possible methods for nation­states to protect themselves against cyber attacks users & # x27 ; s espionage! Vulnerable we are to cyber attacks have been going on for a long time, such Titan! Was conducted by nation-states is the latest in a series of attacks originating out of Mainland.., State actors often play a central role in the spring ( March ) of.. Nation-State 2.0, occurred in 2010 and was a series of cyberattacks on a number of US and government... Other U.S. agencies stretching back to 2003. were codenamed Titan Rain was a of... No ; Stuxnet, which DOD called Titan Rain, was first reported Federal! In the United Kingdom had stated officially that their governmental offices were attacked by hackers a... Cybersecurity from internet service providers to 2003. were codenamed Titan Rain, Moonlight Maze and Red Store breached hundreds unclassified.