Threat Consequences

See the consequences of threats.

You can choose from any available dates, and filter the results.

What you get

Use our data to quickly get the following insight:

On a given day the threat unauthorized database access has yielded many consequences for the United States Office of Personnel Management. These consequences include: database compromised, stolen employee data, stolen financial information, stolen family information, stolen personal information and stolen social security numbers. No es bueno.

Interactive API

Our interactive API powered this example using the link below.
  https://www.surfwatchlabs.com/api/v3/static/swagger.html#!/cyberFacts/getCyberFactsByCyberTagId_get_2

To try it yourself, you'll need your Application ID and Application Key from My API Profile.

The Response

An excerpt of actual output from this insight:

[
  {
    "cyberfact_polarity": -1,
    "cyberfact_score": 68,
    "cyberfact_type_id": 2,
    "cyberfact_id": 285028,
    "event_date": "2014-12-01T00:00:00.000Z",
    "industry_targets": [
      {
        "industry_target_id": 154989,
        "industry_target_description": "United States Office of Personnel Management",
        "industry_id": -4,
        "industry_description": "Government",
        "industry_group_id": 139,
        "industry_group_description": "Administration and Support",
        "industry_target_parent_id": 52617,
        "industry_target_parent_description": "US government"
      }
    ],
    "tags": [
      {
        "tag_id": 100588,
        "tag": "state-sponsored Chinese hacker",
        "macro_tag_id": -100,
        "macro_tag": "State-sponsored",
        "tag_super_type_id": 1,
        "tag_super_type": "Actor"
      },
      {
        "tag_id": 135300,
        "tag": "stolen employee data",
        "macro_tag_id": -522,
        "macro_tag": "Personal Information Stolen/Leaked",
        "tag_super_type_id": 5,
        "tag_super_type": "Effect"
      },
      {
        "tag_id": 2490,
        "tag": "data breach",
        "macro_tag_id": -500,
        "macro_tag": "Data Stolen/Leaked",
        "tag_super_type_id": 5,
        "tag_super_type": "Effect"
      },
      {
        "tag_id": 145981,
        "tag": "employee data",
        "macro_tag_id": -211,
        "macro_tag": "Data",
        "tag_super_type_id": 2,
        "tag_super_type": "Target"
      },
      {
        "tag_id": 122930,
        "tag": "unauthorized database access",
        "macro_tag_id": -303,
        "macro_tag": "Unauthorized Access",
        "tag_super_type_id": 3,
        "tag_super_type": "Practice"
      }
    ],
    "publication_date": "2015-06-25T00:00:00.000Z",
    "cyberfact_source": "http://netsecu.org/i/731f92af0",
    "cyberfact_type": "Cyber Attack",
    "data_feed_ids": [
      -100,
      -4
    ]
  },
  {
    "cyberfact_polarity": -1,
    "cyberfact_score": 75,
    "cyberfact_type_id": 2,
    "cyberfact_id": 285024,
    "event_date": "2014-12-01T00:00:00.000Z",
    "industry_targets": [
      {
        "industry_target_id": 154989,
        "industry_target_description": "United States Office of Personnel Management",
        "industry_id": -4,
        "industry_description": "Government",
        "industry_group_id": 139,
        "industry_group_description": "Administration and Support",
        "industry_target_parent_id": 52617,
        "industry_target_parent_description": "US government"
      }
    ],
    "tags": [
      {
        "tag_id": 5594,
        "tag": "database compromised",
        "macro_tag_id": -500,
        "macro_tag": "Data Stolen/Leaked",
        "tag_super_type_id": 5,
        "tag_super_type": "Effect"
      },
      {
        "tag_id": 122930,
        "tag": "unauthorized database access",
        "macro_tag_id": -303,
        "macro_tag": "Unauthorized Access",
        "tag_super_type_id": 3,
        "tag_super_type": "Practice"
      },
      {
        "tag_id": 18689,
        "tag": "stolen financial information",
        "macro_tag_id": -528,
        "macro_tag": "Financial Information Stolen/Leaked",
        "tag_super_type_id": 5,
        "tag_super_type": "Effect"
      },
      {
        "tag_id": 145981,
        "tag": "employee data",
        "macro_tag_id": -211,
        "macro_tag": "Data",
        "tag_super_type_id": 2,
        "tag_super_type": "Target"
      },
      {
        "tag_id": 135300,
        "tag": "stolen employee data",
        "macro_tag_id": -522,
        "macro_tag": "Personal Information Stolen/Leaked",
        "tag_super_type_id": 5,
        "tag_super_type": "Effect"
      },
      {
        "tag_id": 171361,
        "tag": "stolen family information",
        "macro_tag_id": -522,
        "macro_tag": "Personal Information Stolen/Leaked",
        "tag_super_type_id": 5,
        "tag_super_type": "Effect"
      },
      {
        "tag_id": 4830,
        "tag": "stolen personal information",
        "macro_tag_id": -522,
        "macro_tag": "Personal Information Stolen/Leaked",
        "tag_super_type_id": 5,
        "tag_super_type": "Effect"
      },
      {
        "tag_id": 2490,
        "tag": "data breach",
        "macro_tag_id": -500,
        "macro_tag": "Data Stolen/Leaked",
        "tag_super_type_id": 5,
        "tag_super_type": "Effect"
      },
      {
        "tag_id": 100588,
        "tag": "state-sponsored Chinese hacker",
        "macro_tag_id": -100,
        "macro_tag": "State-sponsored",
        "tag_super_type_id": 1,
        "tag_super_type": "Actor"
      },
      {
        "tag_id": 8383,
        "tag": "stolen social security numbers",
        "macro_tag_id": -522,
        "macro_tag": "Personal Information Stolen/Leaked",
        "tag_super_type_id": 5,
        "tag_super_type": "Effect"
      }
    ],
    "publication_date": "2015-06-25T00:00:00.000Z",
    "cyberfact_source": "http://www.washingtonpost.com/blogs/federal-eye/wp/2015/06/23/effort-to-improve-security-for-federal-employee-records-at-high-risk-of-failure-audit-finds/?postshare=9761435086620458",
    "cyberfact_type": "Cyber Attack",
    "data_feed_ids": [
      -100,
      -4
    ]
  },
  ...
]

The Code

Here is the code to do it yourself:

import javax.ws.rs.client.Client;
import javax.ws.rs.client.ClientBuilder;
import javax.ws.rs.client.WebTarget;
import javax.ws.rs.core.MediaType;
import javax.ws.rs.core.MultivaluedHashMap;
import javax.ws.rs.core.MultivaluedMap;

public class CyberFactsByPractice {

    private static final String API_BASE_URL = "https://www.surfwatchlabs.com:443/api/v3";

    public static void main( String[] args ) throws Exception {

        String tagId = "122930";    // tag is "unauthorized database access"

        Client restClient = ClientBuilder.newClient();
        WebTarget target = restClient.target( API_BASE_URL )
                .path( "/cyberFacts/containingCyberTag/" +  tagId )
                .queryParam( "startDate", "2015-06-25" )
                .queryParam( "endDate", "2015-06-25" );

        MultivaluedMap headers = new MultivaluedHashMap<>();
        headers.add( "app-id", "your-app-id" );
        headers.add( "app-key", "your-app-key" );

        String response = target
                .request( MediaType.APPLICATION_JSON )  // alternately set "Content-Type" header
                .headers( headers )
                .get( String.class );

        System.out.print( response );
    }

}
Or view the source on GitHub
require 'rest_client'
require 'json'

# tag id 122930 is 'unauthorized database access'
url = 'https://www.surfwatchlabs.com:443/api/v3/cyberFacts/containingCyberTag/122930'

header = {
  'content_type' => 'application/json',
  'app-key' => ENV['SURFWATCH_ANALYTICS_APP_KEY'],
  'app-id' => ENV['SURFWATCH_ANALYTICS_APP_ID'],
  params: {
    'startDate' => '2015-06-25',
    'endDate' => '2015-06-25'
  }
}
response = RestClient.get(url, header)
results = JSON.parse(response)
puts results
Or view the source on GitHub