Content text Unit 2 Cyberattacks, Cybersecurity, and Cyber Law.pdf
4 Compiled by: Ridip Khanal Lizard Squad (black hat hacking group, mainly known for their claims of distributed denial-of- service attacks primarily to disrupt gaming-related services) TeslaTeam (TeslaTeam is currently the only virtual army in Serbia to openly launch cyber-attacks.) Hacker teams sponsored by national governments These organized groups has an agenda and targets specific organizations and websites. Some of these groups have ample resources, including fund and sophisticated tools to support their efforts. Today’s computer attacker has greater depth of knowledge and expertise in getting around computer and network security safeguards. Some of the perpetrators of computer crime are: 1. Black Hat Hacker: Someone who violates computer or Internet security maliciously or for illegal personal gain (in contrast to a white hat hacker who is someone who has been hired by an organization to test the security of its information systems). 2. Cracker: An individual who causes problems, steals data, and corrupts systems. 3. Malicious Insider: An employee or contractor who attempts to gain financially and/or disrupt a company’s information systems and business operations. 4. Industrial spy: An individual who captures trade secrets and attempts to gain an unfair competitive advantage. 5. Cybercriminal: Someone who attacks a computer system or network for financial gain. 6. Hacktivist: An individual who hacks computers or websites in an attempt to promote a political ideology. 7. Cyberterrorist: Someone who attempts to destroy the infrastructure components of governments, financial institutions, and other corporations, utilities, and emergency response units. Types of Exploits There are numerous types of computer attacks, with new varieties being invented all the time. Some of the more common attacks include: 1. Ransomware, 2. viruses, 3. worms, 4. Trojan horses, 5. blended threats, 6. spam, 7. distributed denial-of-service (DDoS) attacks, 8. rootkits, 9. advanced persistent threats, 10. phishing and spear phishing, 11. smishing and vishing, 12. cyberespionage, and 13. cyberterrorism