Analysis of some case studies on cyberattacks and proposed methods for preventing them

The last few years have brought about a tremendous increase in the speed of technological advancement and digitalisation which led to an exponential uptick in the amount of data that is being either stored or moved across the cyberspace. This data, either under the ownership of a company operating i...

Full description

Saved in:
Bibliographic Details
Published inRevista română de informatică și automatică = Romanian journal of information technology and automatic control Vol. 33; no. 2; pp. 119 - 134
Main Authors Daniel Mihai LEU, Cătălin UDROIU, Gabriel Mărgărit RAICU, Horațius Nicolae GÂRBAN, Mircea Constantin ȘCHEAU
Format Journal Article
LanguageEnglish
Published ICI Publishing House 01.06.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The last few years have brought about a tremendous increase in the speed of technological advancement and digitalisation which led to an exponential uptick in the amount of data that is being either stored or moved across the cyberspace. This data, either under the ownership of a company operating in the private sector, or of a public sector organization, has become a priority target for malicious actors. From actors that operate under the alleged guise of financially motivated reasons such as ransomware operators to nation state threat groups and politically motivated actors that engage in hacktivist campaigns, an important certainty is that confidential data has become a top priority target for the various types of malicious actors operating across the cyber threat spectrum. Whether it is being sold to the highest bidder, released for free or used in the context of nation state affairs, confidential data became a high-value resource which, in combination with the increasingly complex and politically charged international context of the last few years, has brought about an uptick in number of cyber operations that could be classified as espionage. The aim of this paper is to present a study showcasing the various ways in which data theft, as the main objective, can materialize through malicious cyber campaigns ranging from ransomware operations executed by documented and well-known actors, to malware operations executed under the radar by obscure malicious actors.
ISSN:1220-1758
1841-4303
DOI:10.33436/v33i2y202309