logo

Cyber Attacks: Types, Recent Incidents, Motivations, and Ransomware

   

Added on  2020-10-01

5 Pages1791 Words347 Views
ContentsCyber Attacks:..............................................................................................................................................1Targeted Attacks:........................................................................................................................................1Recent incident of cyber attack:...................................................................................................................2Motivates or Reasons:.............................................................................................................................2Ransomware attack.....................................................................................................................................3Tools/Techniques of occurred attack..........................................................................................................4Cyber Attacks:Cyber attack is an intentional exploitation of computer; technology related organizations as well asnetworks. Utilization of malicious code in order to alter computer code, data or logic that results inturbulent affects which leads to data loss and force cyber crimes like information and identitypersonating. It’s a kind of attack that is launched from single or multiple computers against manynetworks or computers. We can categorize cyber attacks into two distinct types. Attacker’s goal is to disable targeted network or make it offlineAttacker’s goal is to achieve the data access of targeted computer including admin privileges.In accordance to Practical Law Company Whitepaper, cyber attack is a type of attack occurred through acomputer against to a computer, website or single computer that compromises integrity, confidentialityand availability of computer along with the data stored in it. Cyber attacks take form of computer crimethat is generally is a criminal activity in which the target source is the computer or network or the crimeplace. Here the point of notice is that the cyber attacks have a motive to compromise that specific targetedsystem so that the attacker achieves something related to the information stored in the computer or theentire access over the specific system. Cyber criminals use multiple composite methods in order tocircumvent the detection as steal very silently into corporate networks for stealing rational property orgrasp the files for ransom. Their related threats are encrypted in order elude the detection. Targeted Attacks:These attacks are related to those attacks that are modeled at specific organizations, services andindividuals in order to achieve technical, private and institutional data and other logical resources forpreserving or financial gain. In this type of attack is divided due to the fact that attacker has theirparticular interest in the business or they are being paid for targeting the victim. For generating attackbase take months in order to find foremost route to directly convey the exploit towards the targetedsystems or users. This type of attack is much more troublesome and dangerous as compared to theuntargeted ones because it’s been adapted to attack particular systems, processes and individualspresent at workplace or sometimes at the home. Targeted attacks becoming sophisticated enoughbecause they undergoes from diverse stages. Few are mentioned here.
Cyber Attacks: Types, Recent Incidents, Motivations, and Ransomware_1
Spear Phishing: Emails are send to the targeted individuals which includes an attachment along withmalicious software or provided a link which leads towards the installation of that malicious software. Botnet Attacks: Situating a botnet for delivering DDOS Distributed Denial of Service attack, this expandsthe malware that is used in eavesdropping over the network of user or utilized to launch web phishingattack. These botnets are always works under control of botmaster.Advanced Persistent Threat: It is one of the type of targeted attack that is obtained over a specific entityand occurred continuously and intently through various ways for achieving access to the target. Advance Persistent Attacks are classified into two categories:Attacks that are launched by using public servers and websites over the internet.Attacks against the user by using social engineering of the targeted users by sending themmalicious programs.Example: targeted email attacks.Some other types of targeted attacks are Intrusion, CyberEspionage, Elimination of traces of activity andInternal spread Attack. Recent incident of cyber attack:On 10th September 2020, in Düsseldorf city of Germany, a major hospital has become target ofransomware attack. The IT system of Düsseldorf University’s clinic is crashed moderately along theentire week. Women died who need to admit urgently in the hospital but she has to be taken to anothercity for her treatment due to this reason. Details of the incident: An underated DopplePaymer ransomware has crashed the operational systems atone of the major hospital present in North Rhine-Westphalia that is a popular state of Düsseldorf. Thereason behind this crash is the failure of critical systems becomes the reason of delayed emergencytreatment which further results in the death of one patient. It is probably the first case of cyber crime everthat related to the physical casualty. Deadly attack: In accordance to German authorities, this DoppelPaymer ransomware turbulent the ITsystems of Düsseldorf University’ Clinic by infecting 30servers present in the network. The operators ofransomware left with an extortion note having details of the attacker to contact but doesn’t contain anydemand of tactile ransom. Loss and damage: Doctors were unable to access data and start the treatment of patient about anhour due to the reason of system crash. This unfortunate delay leads to the dead of one patientwho required emergency treatment and this patient was being taken to another city for thetreatment.Additionally the attack that targets Heinrich Heine University is affiliated with DüsseldorfUniversity Clinic.The concerned authorities contacted the operators of ransomware and told them the entiresituation occurs from that attack. Then later on the attackers decided to backoff by withdrawingthe extortion attempt and give a digital key in order to decrypt the data.Motivates or Reasons:There is one major reasons behind the occurrence of this ransomware attack.
Cyber Attacks: Types, Recent Incidents, Motivations, and Ransomware_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Understanding Cybercrime: Types, Perpetrators, and Mitigation Strategies
|4
|760
|231

Cyber Crime: Types, Impact, and Prevention
|6
|1317
|227

Importance of Cyber Security in Protecting Against Cyber Attacks
|26
|8270
|85

Cybersecurity Threat Name of the Student
|11
|2321
|49

Cyber Crime: Problems and Solutions
|7
|2138
|193

Identifying and Combating Emerging Threats in Information Systems
|9
|1758
|300