CYBERTERRORISM – A DEVASTATING REALITY
One of the crudest but also true-to-life jokes about the advent of online goes like this: “Terrorist organizations have decided to get into online crime to keep up to date. They have just launched a new app called Pay-Up-Pal.” A joke, yes, but one that is driving cyber criminals today, hell-bent on making online fraud
Cyberterrorism (1) is basically the process of causing harm to the community
Cyber assaults are carried out via hacking of large-scale computer networks. Hackers make use of computer viruses, spyware, malware, ransomware, phishing, programming language scripts, and other malicious software to achieve their purposes. These cyberattacks often lead to criminal offenses
It’s all-pervasive
Terrorist nations are sponsoring hacking groups to embed malware deep inside of the biggest networks.
In 2015, the French channel, TV5 Monde, went 18 hours without broadcasting due to a solid jihadist hack claimed to have been affected by a cyber terrorist organization calling itself ‘CyberCaliphate’. Amongst the most popular news channels alongside the BBC, TV5 was nearly crippled. Almost 250 million homes were affected. The terrorists spread personal data and other information about alleged military personnel and aircraft carrier Charles de Gaulle, a participant in the bombing in Iraq in the attack. Though services were restored, the effect was devastating considering the positions and function of the news channel. The cost of the attack was €5 million in 2015, and €11 million over the next three years – a total of more than €16 million.
The Colonial pipeline incident of May 2021 resulted in a state of emergency being declared, the shutdown of operations involving oil and fuel for a few days, and an unprecedented spike in oil prices in several states in the US. The 5,500-mile pipeline transports almost 45% of gasoline and other fuel products to the eastern coast of the United States. Attackers distributed malware through email, which in turn crippled the billing infrastructure when activated. A ransom to restore services followed, resulting in a payment of USD 4.4 million to the perpetrators. This is a classic example of cyberterrorism combined with cybercrime.
Two months later Jennifer Granholm, the Energy Secretary said that bad actors had gained the ability to shut down the U.S. power grid. The attacks continue to proliferate and grow.
An uphill battle
A brief look at the statistics is sufficient to understand the war footing on which cyberterrorism needs to be addressed. Forbes (3) shares some alarming statistics :
According to Symantec, IoT devices(6) experience an average of 5,000 plus attacks per month. The fact that a majority of new IoT devices are still in their infancy means there is a much larger attack surface for cybercriminals to target the vulnerabilities associated with them.
Recommended by LinkedIn
How it's carried out
The commonly used methods of perpetrating cyberterrorism are:
The Consequences
Cyberterrorism affects everyone from governments to organizations, institutions, and citizens. The crippling effect of these acts
Fighting the Phish
On the back of many cyberterrorist acts and ransomware attacks, it is but natural that measures are being continually stepped up to address this major security threat. The World Economic Forum is committed to helping governments and businesses address unprecedented security risks that threaten to undermine economic growth and public trust, by providing a global platform for dialogue and collaboration between cybersecurity communities in the private and public sectors. The body aims at bringing experts and decision-makers who want to build greater resilience closer.
And in the US, the Biden Administration announced in March 2022 that the Federal Communication Commission will seek rules mandating minimum cybersecurity standards for infrastructure firms, even as the President himself called for greater awareness and response to cyber threats
It is a challenge to address cyberterrorism, as many systems are ineffective against these types of attacks. The use of Internet of Things (IoT) devices also experiences an average of one attack per week, according to Symantec. To combat cyberterrorism, it is important for individuals and organizations to be aware of potential threats and take steps to secure their systems and networks
References
Steve Brass thanks for the repost