logo

Introduction to Cyber Attacks

8 Pages2095 Words327 Views
   

Added on  2020-02-24

Introduction to Cyber Attacks

   Added on 2020-02-24

ShareRelated Documents
PART ACOMPUTER SECURITY BREACH NOTPETYA CYBER ATTACKINTRODUCTIONCyber attacks have increased with the augmenting use of technology and the dependency on technology has been increasing so much that any attack costs millions for anyorganization or the entire country. The loss of money and time is next to impossible to repair.June 2017, a cyber attack by the name of ‘notpetya’ took place which is termed as a wiper and not a ransomware attack. The cost of the said attack is irreparable as once hit the system data is lost forever as the same cannot be recovered even if the victim pays ransom thereby making it one of the most dangerous of the many cyber attacks that has occurred in the past. Europe’s many systems have been compromised by the said attack. Destruction and running of the data is what this attack caused. To the surpsie of all, the hackers had no intention for any kind of a financial benefit. The past version of ‘petya’ was not as destructive as the present one and hence connoted by all as ‘wiper.’ Hence once a data lost is construed as lost forever (Henley 2017). ASSESSMENT OF THE ISSUEThereby one can say that the cyber attack which took place led to disruption forever of the data as in other kinds of attacks one is sure to get back the lost information unlike the attack by ‘petya.’ The present form of the virus had ensured that the data once gone is gone forever and there is no way to get the same back. Ones impacted comprise of WPP, Mondelez- a food company, DLA Piper- a legal firm, Danish Shipping and Maersk who data has been stolen and the hackers are demanding money. Petya has been found triumphant in
Introduction to Cyber Attacks_1
beating the abuse of Eternal Blue and Eternal Romance’s weaknesses in the MS Office loaded systems (Brandom, 2017).Kaspersky Lab has confirmed that the attack has destroyed or hacked approximately 2000 systems covering around a dozen countries. The said attack does not provide instant solution to deal with and hence is connoted to be even more fatal than the WannaCry attack which occurred in May 2017.The virus impacts the entire hard drive and not only a particular file or document. Hence the main intention lies halting of the entire system in totality. Pravda, a Ukranian entity has confiemd that the Chernobyl Nuclear Plant has been impacted by Petya, furthered by another confirmation by one of the biggest transporter globally, Maersk that its Rotterdam system has been infected. Seventeen shipping container terminals run by APM terminals have been infected too wherein two are stated in Rotterdam and the rest in various other parts of the world. Businesses houses have been infected in a major way. To everybody’s surprise, the entire attacks’ initiation point is still being searched for even if the main threat seems to be from Ukraine (Solon, & Hern, 2017). SOLUTIONS TO PREVENT SUCH HACKSRegular updation of one’s systems is one of the most important ways to ensure that the organization is protected against such attacks. March’s crucial patch can be loaded which would help to deal with the attack successfully. The said patch would not only protect now but also in future along with many payloads. Anti-virus companies have also confirmed that they had an updated software which had the ability to detect and protect against petya. Another very common methods of safeguarding systems always is backup. Backing up of files should be done always so that the data can be safeguarded from permanent loss (McGoogan, 2017).
Introduction to Cyber Attacks_2
It is very crucial to know that if a system is hacked by the petya virus then the modus operandi for the said attack is such that post attacking a system, the PCs hang around for an hour before the system is rebooted again. Hence whenever the system is rebooting the user should make a conscious effort to switch off the machines which would further help preventing the files from getting corrupted. Reformatting of the hard drive instantly is a must and hen the back up files should be again loaded. CONCLUSIONThus on a concluding note, it can be said the attack is one of the dangerous ever seen in the history of the cyber attacks. People had thought nothing could be worse than WannaCry but this is way above the same. Destroying the hard drive is like a million dollar loss whose recovery may not be possible and may even lead to closing down of entities. Hence the system operators of the firms should make it compulsory to update systems and backing up of data on a continuous basis.
Introduction to Cyber Attacks_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security Breach - Notpetya Cyber Attack
|8
|2322
|148

Computer Security Breach in Notpetya Cyber Attack
|10
|2248
|160

ASSIGNMENT WHAT IS CYBER CRIME ?
|8
|1982
|28

Ethical Hacking and Hacking Attacks - PDF
|10
|3309
|57

Malware Research Analysis 2022
|6
|1205
|19

Computer Forensics: Investigating Cyber Attacks and Digital Data
|4
|729
|272