Professional Documents
Culture Documents
U R C
– C LE A
r 4 S E V
t e ET A D O
a p N NI
h
C TE L A R V
I
IN H D
P
As real life and online become indistinguishable from each
other, cybercrime has become a part of our daily lives.
government entities,
financial services companies,
Aiming to harm: IT companies,
educational and healthcare institutions,
energy and manufacturing companies.
EXAMPLES:
the Dark Overlord hacking group posted the medical records of around 180,000
patients from three medical centers.
Lithuanian plastic surgery clinic: over 25,000 photos, including naked before
and after pictures, were made public. Initially, the hackers demanded a ransom
from both the clinic (equaling EUR 344,000) and its clients (up to EUR 2,000
from each to delete the data).
One more company that suffered due to a web application vulnerability was
Molina Healthcare, with about 5 million patient records made public
ZERO-DAY VULNERABILITY
Vulnerabilities can appear in almost any type of software, but the most
attractive to targeted attackers is software that is widely used.
Attackers trick people with pop-ups that alert them to a serious error or
problem, thus steering the victim to an 800 number, where a “technical
support representative” attempts to sell the victim worthless services
US, Australia
UK, Germany.
France,
COMPANIES BEHAVIOR
In 2015, more and more companies chose NOT TO REVEAL the full
extent of the breaches they experienced.
SPAMBOTS
Whaling attacks are also customized to the target and use the same
social-engineering, email-spoofing and content-spoofing methods
to access sensitive data.
MALWARE (MALICIOUS SOFTWARE)
Malware includes:
computer viruses,
worms,
Trojan horses FUNCTIONS performed by malicious
spyware. programs : data
Stealing
encrypting or deleting sensitive data,
altering or hijacking core computing
functions
monitoring users' computer activity without
their permission
A VIRUS
is the most common type of malware
A WORM
is a type of malware that can self-replicate without a host program;
SPYWARE
is a kind of malware that is designed to:
- collect information and data on users
- observe their activity without users' knowledge.
Other types of malware include functions or features designed for a specific
purpose.
RANSOMWARE
designed to infect a user's system and encrypt the data.
Cybercriminals then demand a ransom payment from the victim
in exchange for decrypting the system's data.
A ROOTKIT
is a type of malware designed to obtain administrator-level
access to the victim's system.
Once installed, the program gives privileged access to the
system.
A BACKDOOR VIRUS - REMOTE ACCESS TROJAN (RAT)
In the case of the New York Times, criminals posted legitimate ads for a
week prior to gain the trust of the paper before sending bad ads.