Industrial Cyber Attacks: 1990-2025
Explore the most significant cyber attacks in history that shaped our digital security landscape
Filters & Timeline
Target
Trans-Siberian Pipeline
Method
Trojanized SCADA Software
Immediate Impact
Massive explosion in the Trans-Siberian pipeline, causing significant economic damage to the Soviet Union.
Target
Gazprom
Method
Trojan Horse Malware
Immediate Impact
Unauthorized access to Gazprom's control systems, potentially allowing manipulation of gas flow.
Target
Worcester Airport
Method
Telephone System Intrusion
Immediate Impact
Disabled phone service and airport control tower communications for 6 hours.
Target
Maroochy Shire Council
Method
Insider Attack, Radio Transmitter
Immediate Impact
Release of 800,000 liters of raw sewage into local parks, rivers and a hotel property.
Target
Davis-Besse Nuclear Power Plant
Method
SQL Slammer Worm
Immediate Impact
Safety monitoring system disabled for nearly 5 hours.
Target
Iran's Natanz Nuclear Facility
Method
Specialized Malware, Zero-day Exploits
Immediate Impact
Destroyed approximately 1,000 IR-1 centrifuges, setting back Iran's uranium enrichment program.
Target
Global Oil, Energy, and Petrochemical Companies
Method
Spear-phishing, Social Engineering
Immediate Impact
Theft of proprietary operations information, project financing data, and bidding information.
Target
Saudi Aramco
Method
Wiper Malware
Immediate Impact
Destroyed data on 30,000+ workstations, disrupted business operations for weeks.
Target
Unnamed German Steel Mill
Method
Spear-phishing, Social Engineering
Immediate Impact
Massive physical damage to a blast furnace that could not be properly shut down.
Target
Energy Sector Organizations in US and Europe
Method
Watering Hole Attacks, Trojanized Software
Immediate Impact
Espionage, potential preparation for future attacks on industrial systems.
Target
Ukrainian Regional Electric Power Companies
Method
BlackEnergy Malware, Spear-phishing
Immediate Impact
Power outage affecting 230,000 customers for up to 6 hours in the middle of winter.
Target
Ukrenergo (Ukrainian Power Grid)
Method
Specialized ICS Malware
Immediate Impact
Power outage in Kiev for approximately 1 hour.
Target
Unnamed US Water Utility (Kemuri Water Company - pseudonym)
Method
Web Application Exploitation, Lateral Movement
Immediate Impact
Manipulation of chemical levels in water treatment (detected before harm occurred).
Target
Saudi Arabian Petrochemical Plant
Method
Specialized Safety System Malware
Immediate Impact
Unplanned shutdown of industrial processes; could have led to catastrophic safety failures.
Target
Multiple Global Companies (including Maersk, Merck, Mondelez)
Method
Destructive Malware, Supply Chain Attack
Immediate Impact
Over $10 billion in damages globally, disrupted manufacturing and logistics operations worldwide.
Target
Norsk Hydro
Method
LockerGoga Ransomware
Immediate Impact
Production stopped or switched to manual operations at multiple plants, $75 million in damages.
Target
Kudankulam Nuclear Power Plant, India
Method
DTRACK Malware
Immediate Impact
Data exfiltration from administrative network (contained before reaching critical systems).
Target
Industrial Organizations Globally
Method
ICS-aware Ransomware
Immediate Impact
Operational disruption, financial losses, and potential safety risks.
Target
Multiple Israeli Water Treatment Facilities
Method
SCADA System Exploitation
Immediate Impact
Attempted manipulation of water treatment chemicals (largely unsuccessful).
Target
Oldsmar, Florida Water Treatment Facility
Method
Remote Access Compromise
Immediate Impact
Attempted manipulation of sodium hydroxide levels in drinking water (prevented by operator intervention).
Target
Colonial Pipeline
Method
Ransomware, VPN Compromise
Immediate Impact
Shutdown of 5,500 miles of pipeline for 6 days, fuel shortages across the US East Coast, $4.4 million ransom paid.
Target
JBS Foods
Method
REvil Ransomware
Immediate Impact
Shutdown of meat processing plants in US, Canada and Australia; $11 million ransom paid.
Target
Ukrainian Electric Substations
Method
Specialized ICS Malware, Wiper Malware
Immediate Impact
Attempted blackout in Ukraine during Russian invasion (largely thwarted).
Target
South Florida Water Treatment Facility
Method
Compromised HMI System
Immediate Impact
Unauthorized access to water treatment controls (detected before manipulation).
Target
Liquefied Natural Gas Facilities and Electric Utilities
Method
Specialized ICS Malware Framework
Immediate Impact
No confirmed deployment, but capable of causing physical damage and safety incidents.
Target
Port of Nagoya, Japan
Method
Lockbit Ransomware
Immediate Impact
Disruption to Japan's busiest port, affecting cargo handling systems.
Target
Multiple Industrial Organizations
Method
USB-spreading Malware, ICS Reconnaissance
Immediate Impact
Potential espionage and preparation for destructive attacks.
Target
Multiple Energy and Manufacturing Organizations
Method
Zero-day Exploitation, Data Theft
Immediate Impact
Exfiltration of sensitive operational data from multiple critical infrastructure entities.
Target
US Water Utilities and Industrial Control Systems
Method
Remote Access Trojans, Custom ICS Malware
Immediate Impact
Persistent access to multiple water utility control systems.
Target
Global Manufacturing Supply Chains
Method
Advanced Ransomware, OT System Targeting
Immediate Impact
Production stoppages across multiple countries, supply chain disruptions.