Case Studies: Historical Grid
Yahoo Data Breach (2013–2016)
3 Billion Accounts — Russian FSB Operated Silently Inside Yahoo for Three Years
Russian FSB officers infiltrated Yahoo between 2013 and 2016, stealing data on all 3 billion user accounts — the largest breach ever recorded — while Yahoo remained unaware for three years. The attackers also forged authentication cookies, bypassing login event logging entirely. The case established that post-breach forensics must account for multi-year silent dwell and authentication artifact gaps — the same patient persistence pattern demonstrated by APT28 this week.
Marriott / Starwood Breach (2014–2018)
Chinese State Actors Spent Four Years Inside a Network That Was Then Acquired for $13 Billion
Chinese state-sponsored hackers breached Starwood's hotel network in 2014 and remained undetected for four years — surviving Marriott's $13 billion acquisition in 2016 without detection. By discovery in 2018, 500 million guest records had been exfiltrated including passport numbers. The case is the definitive forensic lesson in M&A due diligence: Marriott unknowingly acquired an active four-year intrusion as part of the deal.
XcodeGhost (2015)
4,000 Infected iOS Apps: When China Poisoned the Developer Toolchain Itself
In 2015, Chinese attackers distributed a counterfeit version of Apple's Xcode through domestic file-sharing sites, causing thousands of iOS developers to unknowingly compile malware into their own apps. Over 4,000 infected apps — including WeChat — passed Apple's code-signing process and reached end users worldwide. The case proved developer toolchain compromise is more dangerous than direct payload delivery — the developer becomes an unwitting distributor at scale.
Event-Stream npm Poisoning (2018)
Ownership Transfer as an Attack Vector: The npm Compromise That Foreshadowed the Supply Chain Era
In November 2018, a malicious contributor convinced the maintainer of event-stream — 2 million weekly downloads — to transfer package ownership, then quietly added a dependency containing a cryptocurrency stealer targeting Copay Bitcoin wallet users. The package sat undetected for two months. The case first demonstrated that npm ownership transfer itself was an attack vector, directly foreshadowing the social engineering of the Axios maintainer by UNC1069.
— Page 2 —