Analysis of case studies on cyber attacks and proposed methods for their prevention

被引:4
|
作者
Leu, Daniel Mihai [1 ]
Udroiu, Catalin [1 ,2 ]
Raicu, Gabriel Margarit [1 ]
Garban, Horatius Nicolae [1 ,3 ]
Scheau, Mircea Constantin [1 ,4 ]
机构
[1] Constanta Maritime Univ, Constanta, Romania
[2] ZF Grp, Friedrichshafen, Germany
[3] Romanian Cyber Def Command, Minist Natl Def, Bucharest, Romania
[4] Univ Craiova, Craiova, Romania
关键词
cyber warfare; exfiltration; state sponsors; strategy; damages;
D O I
10.33436/v33i2y202309
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The last few years have brought about a tremendous increase in the speed of technological advancement and digitalisation which led to an exponential uptick in the amount of data that is being either stored or moved across the cyberspace. This data, either under the ownership of a company operating in the private sector, or of a public sector organization, has become a priority target for malicious actors. From actors that operate under the alleged guise of financially motivated reasons such as ransomware operators to nation state threat groups and politically motivated actors that engage in hacktivist campaigns, an important certainty is that confidential data has become a top priority target for the various types of malicious actors operating across the cyber threat spectrum. Whether it is being sold to the highest bidder, released for free or used in the context of nation state affairs, confidential data became a high-value resource which, in combination with the increasingly complex and politically charged international context of the last few years, has brought about an uptick in number of cyber operations that could be classified as espionage. The aim of this paper is to present a study showcasing the various ways in which data theft, as the main objective, can materialize through malicious cyber campaigns ranging from ransomware operations executed by documented and well-known actors, to malware operations executed under the radar by obscure malicious actors.
引用
收藏
页码:119 / 134
页数:16
相关论文
共 50 条
  • [41] Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
    Rosenberg, Ishai
    Shabtai, Asaf
    Elovici, Yuval
    Rokach, Lior
    ACM COMPUTING SURVEYS, 2021, 54 (05)
  • [42] Analysis of jamming and spoofing cyber-attacks on drones
    Aquilar Pey, Jeferson Nascimento
    Amvame Nze, Georges Daniel
    Albuquerque, Robson de Oliveira
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,
  • [43] A Control Strategy for the Prevention of Cyber-Physical Switching Attacks on Smart Grids
    Yogi, Subhash Chand
    Behera, Laxmidhar
    2019 SIXTH INDIAN CONTROL CONFERENCE (ICC), 2019, : 455 - 460
  • [44] OT Security: What to do in case of Cyber Attacks on the OT?
    Speth, Walter
    Kruschitz, Erwin
    ATP MAGAZINE, 2023, (1-2): : 39 - 43
  • [45] CYBER ATTACKS AND POLITICAL EVENTS: THE CASE OF THE OCCUPY CENTRAL CAMPAIGN
    Chow, Kam-Pui
    Yau, Ken
    Li, Frankie
    CRITICAL INFRASTRUCTURE PROTECTION IX, 2015, 466 : 17 - 27
  • [46] A Proposed Study on Economic Impacts due to Cyber Attacks in Smart Grid: A Risk Based Assessment
    Fung, Chun Che
    Roumani, Mehrnaz Akbari
    Wong, Kit Po
    2013 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PES), 2013,
  • [47] Cyber Attacks Analysis Using Decision Tree Technique for Improving Cyber Situational Awareness
    Pournouri, Sina
    Akhgar, Babak
    Bayerl, Petra Saskia
    GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: THE SECURITY CHALLENGES OF THE CONNECTED WORLD, ICGS3 2017, 2016, 630 : 155 - 172
  • [48] Reachability Analysis for Safety Assurance of Cyber-Physical Systems Against Cyber Attacks
    Kwon, Cheolhyeon
    Hwang, Inseok
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (07) : 2272 - 2279
  • [49] Analysis of Malware-Induced Cyber Attacks in Cyber-Physical Power Systems
    Xu, Sheng
    Xia, Yongxiang
    Shen, Hui-Liang
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (12) : 3482 - 3486
  • [50] Cyber-Physical Emulation and Optimization of Worst-Case Cyber Attacks on the Power Grid
    Castillo, Anya
    Arguello, Bryan
    Cruz, Gerardo
    Swiler, Laura
    2019 RESILIENCE WEEK (RWS), 2019, : 14 - 18