Analysis of some case studies on cyberattacks and proposed methods for preventing them
The last few years have brought about a tremendous increase in the speed of technological advancement and digitalisation which led to an exponential uptick in the amount of data that is being either stored or moved across the cyberspace. This data, either under the ownership of a company operating i...
Saved in:
Published in | Revista română de informatică și automatică = Romanian journal of information technology and automatic control Vol. 33; no. 2; pp. 119 - 134 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
ICI Publishing House
01.06.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The last few years have brought about a tremendous increase in the speed of technological advancement and digitalisation which led to an exponential uptick in the amount of data that is being either stored or moved across the cyberspace. This data, either under the ownership of a company operating in the private sector, or of a public sector organization, has become a priority target for malicious actors. From actors that operate under the alleged guise of financially motivated reasons such as ransomware operators to nation state threat groups and politically motivated actors that engage in hacktivist campaigns, an important certainty is that confidential data has become a top priority target for the various types of malicious actors operating across the cyber threat spectrum. Whether it is being sold to the highest bidder, released for free or used in the context of nation state affairs, confidential data became a high-value resource which, in combination with the increasingly complex and politically charged international context of the last few years, has brought about an uptick in number of cyber operations that could be classified as espionage. The aim of this paper is to present a study showcasing the various ways in which data theft, as the main objective, can materialize through malicious cyber campaigns ranging from ransomware operations executed by documented and well-known actors, to malware operations executed under the radar by obscure malicious actors. |
---|---|
ISSN: | 1220-1758 1841-4303 |
DOI: | 10.33436/v33i2y202309 |