BazEkon - The Main Library of the Cracow University of Economics

BazEkon home page

Main menu

Author
Mertoiu George B. (University of Iaşi, Romania), Mesnita Gabriela (University of Iaşi, Romania)
Title
Global Crises and Cybersecurity Atacks - an Analysis During the Covid-19 Pandemic
Globalne kryzysy i ataki na cyberbezpieczeństwo - analiza podczas pandemii COVID-19
Source
Acta Scientiarum Polonorum. Oeconomia, 2021, R. 20, nr 4, s. 39-48, tab., rys., bibliogr. 36 poz.
Keyword
Pandemia, COVID-19, Cyberbezpieczeństwo, Kryzys gospodarczy
Pandemic, COVID-19, Cybersecurity, Economic crisis
Note
JEL Classification: F60, I30, L86
streszcz., summ.
Abstract
Pandemia COVID-19 dotknęła wszystkie narody w różnych wymiarach - zarówno gospodarczym, jak i społecznym. Nowa normalność jako zachowania społeczne podyktowane nałożonymi ograniczeniami podtrzymała interakcje online, co umożliwiło zwiększenie zakresu cyberataków. Artykuł ma na celu analizę cyberataków przeprowadzanych podczas pandemii COVID-19, począwszy od serii wydarzeń międzynarodowych, takich jak kryzys w Wenezueli czy na Ukrainie. Częścią tego badania jest ilościowa analiza wyników uzyskanych z przeglądu zasobów bazy Scopus. W tej części, oprócz najważniejszych autorów i użytych słów kluczowych, starano się ustalić, czy kraje będące głównymi celami cyberataków są również zaangażowane w badanie cyberbezpieczeństwa podczas pandemii. Cyberataki są analizowane pod kątem motywacji i celów atakujących. Wskazano również kolejne kierunki badań w tym zakresie. (abstrakt oryginalny)

The COVID-19 pandemic has affected all nations in various ways, both economically and especially socially. The new normality, as social behavior dictated by the restrictions imposed, sustained online interaction, a factor that allowed an increase in cyberattacks. This paper intends to analyze the cyberattacks conducted during the COVID-19 pandemic, starting from a series of international events such as the crisis in Venezuela or Ukraine. A part of this study is a quantitative analysis of the results obtained from consulting the Scopus database. In this part, in addition to the most important authors and key words used, we aimed to find if the countries that are the main targets of cyberattacks are also involved in researching cybersecurity during pandemic. Cyberattacks are analyzed in terms of motivation and targets, aiming to identify possible solutions based on the modus operandi of attackers and what will be the next steps in the research. (original abstract)
Full text
Show
Bibliography
Show
  1. Abraham, S., Chengalur-Smith, I.N. (2010). An overview of social engineering malware: trends, tactics, and implications. Technol. Soc., 32, 3, 183-196.
  2. Anderson, C. (2020). CovidLock: Mobile Coronavirus Tracking App Coughs Up Ransomware. Dmaintools. Retrieved from https://www.domaintools.com/re-sources/blog/covidlock-mobile-coronavirus-tracking-app-coughs-up-ransomware [accessed 04.09.2021].
  3. Boone, J. (2014). Global hackers hit Venezuelan government, servers 'falling like dominoes'. The World. Retrieved from https://www.pri.org/stories/2014-02-17/global-hackers-hit-venezuelan-government-servers-fall-ing-dominoes [accessed 03.09.2021].
  4. Borzou, D., (2018). Erdogan Is Failing Economics 101. Foreign Policy, May.
  5. Brewster, T., (2019). Chinese Hacker Crew Stole NSA Cyber Weapons In 2016 - A Year Before They Were Leaked Online. Forbes, 7 May. Retrieved from https://www.forbes.com/sites/thomasbrewster/2019/05/07/chinese-hacker-crew-stole-nsa-cyber-weapons-in-2016--a-year-before-they-were-leaked-online/?sh=3b89b182237b [accessed 03.09.2021].
  6. Brewster, T., (2020). There Are Now More Than 40,000 'High-Risk' COVID-19 Threats On The Web. Forbes, 22 April. Retrieved from https://www.forbes.com/sites/thomasbrewster/2020/04/22/there-are-now-more-than-40000-high-risk-covid-19--threats-on-the-web/ [accessed 03.09.2021].
  7. Bryan, K., (2020). Fraudsters impersonate airlines and Tesco in coronavirus scams. The Times, 25 April. Retrieved from https://www.thetimes.co.uk/article/fraudsters-impersonate-airlines-and-tesco-in-coronavirus-scams-5wdwhxq7p [accessed 04.09.2021].
  8. Bundy, J., Pfarrer, M.D., Short, C.E., Coombs, W.T. (2017). Crises and crisis management: Integration, interpretation, and research development. J Manage., 43, 1661-1692.
  9. Check Point (2020). Coronavirus cyberattacks update: beware of the phish. Retrieved from https://blog.check-point.com/2020/05/12/coronavirus-cyber-attacks-up-date-beware-of-the-phish/ [accessed 03.09.2021].
  10. Europol, (2020). Pandemic Profiteering: How Criminals Exploit COVID-19 Crisis. Retrieved from https://www.europol.europa.eu/publications-documents/pandemic-profiteering-how-criminals-exploit-covid-19-crisis [accessed 04.09.2021].
  11. Fleming, S. (2020). Threat Spotlight: Coronavirus-related phishing. Retrieved from https://blog.barracuda.com/2020/03/26/threat-spotlight-coronavirus-related-phishing/ [accessed 01.09.2021].
  12. Johnson, J., (2021). Amount of monetary damage caused by reported cyber crime to the IC3 from 2001 to 2020. Retrieved from https://www.statista.com/statistics/267132/t o t a l - d a m a g e - c a u s e d - b y - b y - c y b e r - c r i m e - i n -the-us/#statisticContainer [accessed 23.08.2021].
  13. Kitroeff, N., Weisenthal, J., (2014). Here's Why the Russian Ruble Is Collapsing. Businessweek. Bloomberg, December. Retrieved from https://www.bloomberg.com/news/articles/2014-12-16/no-caviar-is-not-get-ting-cheaper-everything-you-need-to-know-about-the-russian-ruble-collapse [accessed 03.09.2021].
  14. Krebs on Security (2020). Live Coronavirus Map Used to Spread Malware. Retrieved from https://krebsonsecu-rity.com/2020/03/live-coronavirus-map-used-to-spread-malware/ [accessed 05.09.2021].
  15. Krombholz, K., Hobel, H., Huber, M., Weippl, E. (2015). Advanced social engineering attacks. Inf. Secur. Appl., 22, 113-122.
  16. Kumaran, N., Lugani, S. (2020). Protecting businesses against cyber threats during COVID-19 and beyond. Retireved from https://cloud.google.com/blog/products/identity-security/protecting-against-cyber-threats-dur-ing-covid-19-and-beyond [accessed 01.09.2021].
  17. Lallie, H.S., Shephred, L.A., Nurse, J.R.C., Erola, A., Epiphaniou, G., Maple, C., Bellekens, X. (2021). Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic. Computers & Security, 105, 102248.
  18. Lee, J., (2013). OpUkraine kicked off by r00tsecurity. Retrieved from https://www.databreaches.net/opukraine-kicked-off-by-r00tsecurity/ [accessed 03.09.2021].
  19. Lindseyh (2020). 10 Tips to help if you are worried about Coronavirus. Retrived from https://www.dudleyccg.nhs.uk/10-tips-to-help-if-you-are-worried-about-coronavi-rus/ [accessed 01.09.2021].
  20. MalwareBytes (2020). Cybercriminals impersonate World Health Organization to distribute fake coronavirus e-book. Retrieved from https://blog.malwarebytes.com/social-engineering/2020/03/cybercriminals-imperson-ate-world-health-organization-to-distribute-fake-coro-navirus-e-book/ [accessed 04.09.2021].
  21. Nabe, C. (2020). Impact of COVID-19 on Cybersecurity. Deloitte. Retrieved from https://www2.deloitte.com/ch/en/pages/risk/articles/impact-covid-cybersecurity.html [accessed 02.09. 2021].
  22. Norton (2020). Coronavirus Phishing Emails: How to Protect Against COVID-19 Scams. Retrieved from https://us.norton.com/internetsecurity-online-scams-coronavi-rus-phishing-scams.html [accessed 03.09.2021].
  23. Nurse, J.R.C. (2019). Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit. [In:] A. Attrill-Smith, Ch. Fullwood, M. Keep, D.J. Kuss (Eds). The Oxford Handbook of Cyberpsychology. Oxford University Press, Oxford, 663-690.
  24. O'Brien, M. (2018). Turkey's economy looks like it's headed for a big crash. Washington Post, 13 July. Retrieved from https://www.washingtonpost.com/business/2018/07/13/turkeys-economy-looks-like-its-headed-big-crash/ [accessed: 03.09.2021].
  25. Passeri, P. (2015). 2014 Cyber Attacks Statistics. R e t r i e v e d f r o m h t t p s : / / w w w. h a c k m a g e d d o n .c o m / 2 0 1 5 / 0 1 / 1 3 / 2 0 1 4 - c y b e r- a t t a c k s - s t a t i s t i c s -aggregated/ [accessed 03.09.2021].
  26. Pastebin (2014). #OpPortugal. Retrieved from https://paste-bin.com/VsEGgfRw [accessed 03.09.2021].
  27. Paul, K. (2020). US Authorities Battle Surge in Coron- avirus Scams, From Phishing to Fake Treatments. The Guardian, 19 March. Retrieved from https://www.the-guardian.com/world/2020/mar/19/coronavirus-scams-phishing-fake-treatments [accessed 01.09.2021].
  28. Piiparinen, A. (2016). China's Secret Weapon in the South China Sea: Cyber Attacks. Retrieved from https://thediplomat.com/2016/07/chinas-secret-weapon-in-the-south-china-sea-cyber-attacks/ [accessed 03.09.2021].
  29. Riley, Ch., Yan, S. (2015). China's stock market crash in 2 minutes. CNNMoney, July. Retrieved from https://money.cnn.com/2015/07/09/investing/china-crash-in-two-minutes/index.html [accessed 03.09.2021].
  30. Smithers, R. (2020). Fraudsters use bogus NHS contact-trac-ing app in phishing scam. The Guardian, 13 May. Re-trived from https://www.theguardian.com/world/2020/may/13/fraudsters-use-bogus-nhs-contact-tracing-app-in-phishing-scam [accessed 01.09.2021].
  31. Stubbs, J., Bing, Ch., Menn, J. (2020). Exclusive: Hackers acting in Turkey's interests believed to be behind re-cent cyberattacks - sources. Reuters, 27 Jannuary. Re-trieved from https://www.reuters.com/article/us-cyber-attack-hijack-exclusive-idUSKBN1ZQ10X [accessed 01.09.2021].
  32. Support Anon Candanga (2019). Op Venezuela. Retrieved from https://anoncandanga.com/tag/op-venezuela/ [accessed 03.09.2021].
  33. Venette, S.J. (2003). Risk communication in a High Reliability Organization: APHIS PPQ's inclusion of risk in decision making. Faculty of the of Agriculture and Applied Science, North Dakota State University, Fargo [PhD thesis].
  34. Viktorov, I., Abramov, A. (2020). The 2014-15 Financial Crisis in Russia and the Foundations of Weak Monetary Power Autonomy in the International Political Economy. New Political Economy, 25, 4, 487-510.
  35. Zetter, K. (2016). Inside the cunning, unprecedented hack of Ukraine's power grid. Wired, March.
  36. Zumbrun, J. (2020). Coronavirus Slump Is Worst Since Great Depression. Will It Be as Painful?. The Wall Street Journal, 10 May. Retrieved from https://www.wsj.com/articles/coronavirus-slump-is-worst-since-great-de-pression-will-it-be-as-painful-11589115601 [accessed 03.09.2021]
Cited by
Show
ISSN
1644-0757
Language
eng
URI / DOI
http://dx.doi.org/10.22630/ASPE.2021.20.4. 30
Share on Facebook Share on Twitter Share on Google+ Share on Pinterest Share on LinkedIn Wyślij znajomemu