2021
DOI: 10.1080/1097198x.2021.1914503
|View full text |Cite
|
Sign up to set email alerts
|

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 0 publications
0
3
0
1
Order By: Relevance
“…While it is generally difficult to determine the exact costs and damages resulting from a cyber attack on critical infrastructures [38], experts recognise that a defender's ability to timely detect an attack, and recover from it, significantly affects the overall impact of malicious conduct [39], [40]. Therefore, we consider three categories of impact resulting from cyber attacks, based on the impact that such attacks may produce on critical infrastructures:…”
Section: Experimental Designmentioning
confidence: 99%
“…While it is generally difficult to determine the exact costs and damages resulting from a cyber attack on critical infrastructures [38], experts recognise that a defender's ability to timely detect an attack, and recover from it, significantly affects the overall impact of malicious conduct [39], [40]. Therefore, we consider three categories of impact resulting from cyber attacks, based on the impact that such attacks may produce on critical infrastructures:…”
Section: Experimental Designmentioning
confidence: 99%
“…56 E. Kovacs, U.S., Canada, Australia attribute NotPetya attack to Russia, Security Week, 16.02.2018, https://www.securityweek.com/us-canada-australia-attribute-notpetya-attack-russia (dostęp 30.09.2020). formacji dziennikarza A. Greenberga za przeprowadzenie ataku odpowiedzialna jest grupa Sandworm, znana również jako TeleBots 57 lub GreyEnergy, w opinii autora działająca w ramach GRU 58 , czyli wywiadu wojskowego Federacji Rosyjskiej, a wcześniej ZSRR 59 . Podobnego zdania są firma ESET 60 , ukraińska ISSP 61 oraz brytyjskie National Cyber Security Centre (NCSC) 62 .…”
Section: Atrybucja Atakuunclassified
“…What used to require extensive technical skills can now be purchased on dark web marketplaces with crypto-currency. Custom spyware, hacking-for-hire mercenaries, botnets-for-rent and more enable wideranging cybercrimes and surveillance (Greenberg, 2019). Cyber-attacks now come from various motivated actors including [14]:…”
Section: B the Evolving Cyber Threat Landscapementioning
confidence: 99%