Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Timeline of Key Cyber-Kinetic Attacks, Incidents and Research


Published on

Cyber-kinetic attacks exploit vulnerabilities in Cyber-Physical Systems such as Industrial Control Systems (ICS) and Internet of Things (IoT) to impact the physical world and threaten lives, well-being and the environment. Such attacks are becoming more frequent as we increasingly adopt Cyber-Physical Systems to monitor and control the physical world around us. Timeline shows a sampling of known cyber-kinetic malfunctions, attacks and research over the last 35 years.

Published in: Technology
  • Be the first to comment

Timeline of Key Cyber-Kinetic Attacks, Incidents and Research

  1. 1. Explosion of Siberian natural gas pipeline TIMELINE OF KEY CYBER-KINETICATTACKS, INCIDENTS AND RESEARCH ’82 ’85 Therac-25 radiation poisoning ’97 ’99 ’00 ’03 ’05 ’06 ’07 ’08 ’09 ’10 ’11 ’13 ’14 ’15 ’16 ’17 U.S.S. Yorktown stranded Worcester airport control tower lost communication Bellingham, Washington pipeline rupture Maroochy shire wastewater plant compromised Davis-Besse nuclear power plant worm Worm cripples CSX transport system Worm cripples industrial plants Taum Sauk dam failure Los Angeles traffic system attack Browns Ferry nuclear plant Harrisburg, Pennsylvania water filtration plant hack Aurora Generator Test Test defibrillators and pacemakers Lodz, Poland tram hack Pacific Energy Resources hack Internet attack on epileptics Turkish oil pipeline rupture Hatch nuclear power plant Stuxnet attack on Iranian nuclear power facility Texas power company hack San Bruno gas pipeline explosion Marshall, Michigan crude oil spill Test of insulin pumps Houston water distribution system hack Ransom attacks on hospitals Test traffic system vulnerabilities Ukraine power grid attack Researchers remotely control cars Unidentified water facility SF Muni ransomware German steel mill attack Finland smart building 2nd Ukrainian power grid attack Alpine ski resort ransomware Dallas emergency sirens hack “WannaCry” Ransomware Test of superyacht vulnerabilities Test of vulnerabilities in industrial robots Test of ICS vulnerability to ransomware Author: Marin Ivezic,, This work is licensed under a Creative Commons Attribution 4.0 International License ’96 Ariane 5 rocket explosion Researcher demo Malfunction Collateral damage from untargeted attack Targeted attack ’12 Unidentified nuclear power plant Test of key card locks Demonstration of passenger jet vulnerabilities