Case Studies: Historical Grid
Moonlight Maze (1996–1999)
The First State Cyber Espionage Campaign — Russia's Multi-Year Infiltration of US Military Networks
From 1996 to 1999, Russian state actors systematically exfiltrated terabytes from US military, NASA, and DoE networks in what became the first publicly attributed state-sponsored cyber espionage campaign — Moonlight Maze. Investigators traced the attack through telephone records and sustained international cooperation, establishing the attribution framework still applied in state-nexus telecom cases like BPFdoor today.
Operation APT1 / Comment Crew (2006–2013)
The Mandiant Report That Named Names: How China's PLA Stole Terabytes From 141 US Organizations
In February 2013, Mandiant publicly attributed years of systematic IP theft to China's PLA Unit 61398 — designating them APT1. The Comment Crew maintained persistent access to 141 US organizations across 20 industries for an average of 356 days per victim, stealing terabytes of intellectual property. The report pioneered the modern threat-actor attribution methodology that every state-nexus investigation now follows.
SolarWinds Orion Supply Chain (2020)
SUNBURST: The Supply Chain Attack That Reached 18,000 Organizations
In December 2020, state-sponsored attackers embedded a backdoor called SUNBURST into SolarWinds Orion software updates, compromising 18,000 organizations including nine US federal agencies. The malware lay dormant for two weeks before activation, communicating via DNS beaconing that mimicked legitimate Orion traffic. Its discovery forced investigators to develop new methodologies to distinguish compromised telemetry from authentic network data.
Colonial Pipeline Ransomware (2021)
One Compromised Password Shut Down 45% of US East Coast Fuel Supply
The DarkSide ransomware attack on Colonial Pipeline in May 2021 forced a six-day shutdown of 5,500 miles of fuel pipeline serving 45% of the US East Coast. Attackers gained initial access via a single compromised VPN credential with no MFA enforced — the account had not been used in months but remained active. The incident became the primary basis for CISA's OT/ICS network segmentation guidance and defined critical infrastructure IR planning for years.
— Page 2 —