25.07.2019 Views

International Cyber Terrorism

International Cyber Terrorism

International Cyber Terrorism

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• "Stealth" and other advanced scanning techniques<br />

• Targeting of specific users<br />

• Widespread attacks on DNS infrastructure<br />

• Widespread attacks using NNTP to distribute attack<br />

• Wide-scale trojan distribution<br />

• Wide-scale use of worms<br />

• Widespread, distributed denial-of-service attacks<br />

• Windows-based remote access trojans (Back Orifice)<br />

________<br />

A <strong>Cyber</strong>attack is any type of offensive maneuver employed by individuals or whole<br />

organizations that targets computer information systems, infrastructures, computer<br />

networks, and/or personal computer devices by various means of malicious acts usually<br />

originating from an anonymous source that either steals, alters, or destroys a specified<br />

target by hacking into a susceptible system.<br />

Indiscriminate Attacks<br />

These attacks are wide-ranging, global and do not seem to discriminate among<br />

governments and companies.<br />

• Operation Shady RAT<br />

• World of Hell<br />

• Red October, discovered in 2012, was reportedly operating worldwide for up to<br />

five years prior to discovery, transmitting information ranging from diplomatic<br />

secrets to personal information, including from mobile devices.<br />

• WannaCry ransomware attack on 12 May 2017 affecting hundreds of thousands<br />

of computers in more than 150 countries.<br />

• 2017 Petya cyberattack<br />

Destructive Attacks<br />

These attacks relate to inflicting damage on specific organizations.<br />

• Great Hacker War, and purported "gang war" in cyberspace<br />

• LulzRaft, hacker group known for a low impact attack in Canada<br />

• Operation Ababil, conducted against American financial institutions<br />

• TV5Monde April 2015 cyberattack<br />

• Vulcanbot<br />

• Shamoon, a modular computer virus, was used in 2012 in an attack on<br />

30,000 Saudi Aramco workstations, causing the company to spend a week<br />

restoring their services.<br />

• Wiper – in December 2011, the malware successfully erased information on hard<br />

disks at the Oil Ministry's headquarters.<br />

Page 100 of 174

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!