International Cyber Terrorism
International Cyber Terrorism
International Cyber Terrorism
- No tags were found...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
• "Stealth" and other advanced scanning techniques<br />
• Targeting of specific users<br />
• Widespread attacks on DNS infrastructure<br />
• Widespread attacks using NNTP to distribute attack<br />
• Wide-scale trojan distribution<br />
• Wide-scale use of worms<br />
• Widespread, distributed denial-of-service attacks<br />
• Windows-based remote access trojans (Back Orifice)<br />
________<br />
A <strong>Cyber</strong>attack is any type of offensive maneuver employed by individuals or whole<br />
organizations that targets computer information systems, infrastructures, computer<br />
networks, and/or personal computer devices by various means of malicious acts usually<br />
originating from an anonymous source that either steals, alters, or destroys a specified<br />
target by hacking into a susceptible system.<br />
Indiscriminate Attacks<br />
These attacks are wide-ranging, global and do not seem to discriminate among<br />
governments and companies.<br />
• Operation Shady RAT<br />
• World of Hell<br />
• Red October, discovered in 2012, was reportedly operating worldwide for up to<br />
five years prior to discovery, transmitting information ranging from diplomatic<br />
secrets to personal information, including from mobile devices.<br />
• WannaCry ransomware attack on 12 May 2017 affecting hundreds of thousands<br />
of computers in more than 150 countries.<br />
• 2017 Petya cyberattack<br />
Destructive Attacks<br />
These attacks relate to inflicting damage on specific organizations.<br />
• Great Hacker War, and purported "gang war" in cyberspace<br />
• LulzRaft, hacker group known for a low impact attack in Canada<br />
• Operation Ababil, conducted against American financial institutions<br />
• TV5Monde April 2015 cyberattack<br />
• Vulcanbot<br />
• Shamoon, a modular computer virus, was used in 2012 in an attack on<br />
30,000 Saudi Aramco workstations, causing the company to spend a week<br />
restoring their services.<br />
• Wiper – in December 2011, the malware successfully erased information on hard<br />
disks at the Oil Ministry's headquarters.<br />
Page 100 of 174