What are politically motivated attacks on information systems?

What are politically motivated attacks on information systems?
Photo by Adam Glanzman/Northeastern University

An international cyberattack struck parts of Europe, Asia, and the United States on Tuesday, crippling tens of thousands of computers at banks, hospitals, and government offices worldwide. Initial analysis found that the attack was designed for profit, with the hackers demanding $300 in Bitcoin in exchange for unlocking victims’ screens. But further evidence now suggests that the malware was a “wiper,” designed to destroy data on targets’ storage systems regardless of whether they gave in to the monetary demand.

“Initial reports suggested that this was a variant of an existing strain of ransomware,” said Wil Robertson, assistant professor of computer science at Northeastern, who specializes in detecting and preventing web-based attacks. “But it turns out that it was designed purely for destructive purposes.”

The malware originated in Ukraine on the eve of the country’s Constitution Day, leading one computer scientist to speculate that it was “aimed at generating chaos, not money.” According to a New York Times report, many Ukrainians have cast their suspicions on Russia as the culprit.

Was this a state-sponsored attack? John Manferdelli, executive director of Northeastern’s Cybersecurity and Privacy Institute, is not 100 percent sure. But he said “it certainly smells bad,” referring to the high probability that Russia is the source of the virus.

Manferdelli himself is the former engineering director for production security development at Google. He noted that “cyberattacks are nothing new,” explaining that hackers have been using ransomware and stealing intellectual property for years. But he added that politically motivated hacking might be on the rise, the new normal. “People forget that cyberattacks were quite common five or even 10 years ago,” he explained. “What’s different now is the motivation.”

Robertson agreed, saying that we’ll “certainly see more and more nation-state malware cropping up as cyberspace becomes more militarized as a way to achieve geopolitical goals.”

This wiper attack—like last month’s WannaCry ransomware attack—reportedly used hacking tools that were stolen from the National Security Agency and leaked online by a group called the Shadow Brokers. WannaCry infected more than 300,000 computers in over 150 countries worldwide, making more than $80,000 in the process. The hackers behind the wiper, dubbed “Petya,” have made less than $10,000, reinforcing the theory that money was not their primary motivation.

Robertson and Manferdelli advised ransomware victims not to pay up, even if doing so would allow them to recover their data. “Typically you don’t want to pay the ransom, because there’s no guarantee that you’d get your files back and you’re really just sending money to a criminal enterprise,” Robertson explained.

Carla Brodley, dean of the College of Computer and Information Science, noted that people could protect themselves from future ransomware attacks by updating their software and backing up their data. Running an out-of-date system, she said, is a surefire way to be hit with the next WannaCry- or Petya-like attack. “When your auto update pops up on your computer screen when you’re watching Orange is the New Black,” she said, “stop binge-watching the show and update your system immediately.”

Get help with access

Institutional access

Access to content on Oxford Academic is often provided through institutional subscriptions and purchases. If you are a member of an institution with an active account, you may be able to access content in one of the following ways:

IP based access

Typically, access is provided across an institutional network to a range of IP addresses. This authentication occurs automatically, and it is not possible to sign out of an IP authenticated account.

Sign in through your institution

Choose this option to get remote access when outside your institution. Shibboleth / Open Athens technology is used to provide single sign-on between your institution’s website and Oxford Academic.

  1. Click Sign in through your institution.
  2. Select your institution from the list provided, which will take you to your institution's website to sign in.
  3. When on the institution site, please use the credentials provided by your institution. Do not use an Oxford Academic personal account.
  4. Following successful sign in, you will be returned to Oxford Academic.

If your institution is not listed or you cannot sign in to your institution’s website, please contact your librarian or administrator.

Sign in with a library card

Enter your library card number to sign in. If you cannot sign in, please contact your librarian.

Society Members

Society member access to a journal is achieved in one of the following ways:

Sign in through society site

Many societies offer single sign-on between the society website and Oxford Academic. If you see ‘Sign in through society site’ in the sign in pane within a journal:

  1. Click Sign in through society site.
  2. When on the society site, please use the credentials provided by that society. Do not use an Oxford Academic personal account.
  3. Following successful sign in, you will be returned to Oxford Academic.

If you do not have a society account or have forgotten your username or password, please contact your society.

Sign in using a personal account

Some societies use Oxford Academic personal accounts to provide access to their members. See below.

Personal account

A personal account can be used to get email alerts, save searches, purchase content, and activate subscriptions.

Some societies use Oxford Academic personal accounts to provide access to their members.

Viewing your signed in accounts

Click the account icon in the top right to:

  • View your signed in personal account and access account management features.
  • View the institutional accounts that are providing access.

Signed in but can't access content

Oxford Academic is home to a wide variety of products. The institutional subscription may not cover the content that you are trying to access. If you believe you should have access to that content, please contact your librarian.

Institutional account management

For librarians and administrators, your personal account also provides access to institutional account management. Here you will find options to view and activate subscriptions, manage institutional settings and access options, access usage statistics, and more.

What are the most common motivations for information security attacks?

Most often, cyber attacks happen because criminals want your:.
business' financial details..
customers' financial details (eg credit card data).
sensitive personal data..
customers' or staff email addresses and login credentials..
customer databases..
clients lists..
IT infrastructure..

What are the 4 types of attacks in a software?

What are the four types of attacks? The different types of cyber-attacks are malware attack, password attack, phishing attack, and SQL injection attack.

What are the types of attacks in information security?

Common types of cyber attacks.
Malware. Malware is a term used to describe malicious software, including spyware, ransomware, viruses, and worms. ... .
Phishing. ... .
Man-in-the-middle attack. ... .
Denial-of-service attack. ... .
SQL injection. ... .
Zero-day exploit. ... .
DNS Tunneling..

Who are politically motivated hackers?

Derived from combining the words 'Hack' and 'Activism', hacktivism is the act of hacking, or breaking into a computer system, for politically or socially motivated purposes.