Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity Incidents

The exponential growth in the interconnectedness of people and devices, as well as the upward trend in cyberspace usage will continue to lead to a greater reliance on the internet. Most people’s daily activities are dependent on their ability to navigate the internet to access and manage...

Full description

Bibliographic Details
Main Authors: Olufunsho I. Falowo, Saheed Popoola, Josette Riep, Victor A. Adewopo, Jacob Koch
Format: Article
Language:English
Published: IEEE 2022-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9998178/
_version_ 1797974428975366144
author Olufunsho I. Falowo
Saheed Popoola
Josette Riep
Victor A. Adewopo
Jacob Koch
author_facet Olufunsho I. Falowo
Saheed Popoola
Josette Riep
Victor A. Adewopo
Jacob Koch
author_sort Olufunsho I. Falowo
collection DOAJ
description The exponential growth in the interconnectedness of people and devices, as well as the upward trend in cyberspace usage will continue to lead to a greater reliance on the internet. Most people’s daily activities are dependent on their ability to navigate the internet to access and manage information. There are usually real risks associated with managing or accessing information, and these risks when exploited by threat actors, often lead to cybersecurity incidents. It is a common knowledge that a major cybersecurity incident is likely to result in significant financial losses, legal liability, privacy violations, reputational damage, sensitive data compromises, as well as national security implications. Threat actors usually employ various attack techniques to cause these incidents. After we identified the major cybersecurity incident report that is consolidated by the Center for Strategic & International Studies (CSIS) from which we derived the data of about the 803 major incidents that we analyzed, we then verified its (CSIS) credibility, non-partisan, global outreach and cybersecurity attack coverage by cross-referencing it with Data Breach Investigation Report (DBIR). We also through the lens of the Global Cybersecurity Index (GCI) ensured that this study is conducted within the context of cybersecurity principles. In reference to these attack techniques employed by threat actors, we conducted an exploratory investigation of 803 major cybersecurity incidents that were reported over the last decade. From a group of 244 of these major security incidents that happened and were reported between 2005 and 2021, this study reports that malware attack techniques were employed by threat actors to cause 48 percent of them and phishing attack techniques account for 19.7 percent of them. As many sources have confirmed the fact that major incidents will always happen, we echo the importance of readiness of organizations to conduct cybersecurity incident triage and or thorough investigation as necessary. Given the relevance of the guidelines outlined in the National Institute of Standards and Technology (NIST) incident response framework, we also recommend that organizations should adopt it or at least embrace similar guidelines as best as possible.
first_indexed 2024-04-11T04:19:49Z
format Article
id doaj.art-a9ec4f8cbabf477084e0720e5d8b3baa
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-04-11T04:19:49Z
publishDate 2022-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-a9ec4f8cbabf477084e0720e5d8b3baa2022-12-31T00:01:25ZengIEEEIEEE Access2169-35362022-01-011013403813405110.1109/ACCESS.2022.32318479998178Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity IncidentsOlufunsho I. Falowo0https://orcid.org/0000-0002-4460-0986Saheed Popoola1https://orcid.org/0000-0002-9602-6322Josette Riep2Victor A. Adewopo3https://orcid.org/0000-0002-1700-5241Jacob Koch4School of Information Technology, University of Cincinnati, Cincinnati, OH, USASchool of Information Technology, University of Cincinnati, Cincinnati, OH, USASchool of Information Technology, University of Cincinnati, Cincinnati, OH, USASchool of Information Technology, University of Cincinnati, Cincinnati, OH, USASchool of Information Technology, University of Cincinnati, Cincinnati, OH, USAThe exponential growth in the interconnectedness of people and devices, as well as the upward trend in cyberspace usage will continue to lead to a greater reliance on the internet. Most people’s daily activities are dependent on their ability to navigate the internet to access and manage information. There are usually real risks associated with managing or accessing information, and these risks when exploited by threat actors, often lead to cybersecurity incidents. It is a common knowledge that a major cybersecurity incident is likely to result in significant financial losses, legal liability, privacy violations, reputational damage, sensitive data compromises, as well as national security implications. Threat actors usually employ various attack techniques to cause these incidents. After we identified the major cybersecurity incident report that is consolidated by the Center for Strategic & International Studies (CSIS) from which we derived the data of about the 803 major incidents that we analyzed, we then verified its (CSIS) credibility, non-partisan, global outreach and cybersecurity attack coverage by cross-referencing it with Data Breach Investigation Report (DBIR). We also through the lens of the Global Cybersecurity Index (GCI) ensured that this study is conducted within the context of cybersecurity principles. In reference to these attack techniques employed by threat actors, we conducted an exploratory investigation of 803 major cybersecurity incidents that were reported over the last decade. From a group of 244 of these major security incidents that happened and were reported between 2005 and 2021, this study reports that malware attack techniques were employed by threat actors to cause 48 percent of them and phishing attack techniques account for 19.7 percent of them. As many sources have confirmed the fact that major incidents will always happen, we echo the importance of readiness of organizations to conduct cybersecurity incident triage and or thorough investigation as necessary. Given the relevance of the guidelines outlined in the National Institute of Standards and Technology (NIST) incident response framework, we also recommend that organizations should adopt it or at least embrace similar guidelines as best as possible.https://ieeexplore.ieee.org/document/9998178/Data breachDoS attacksDDoS attacksexploits of unpatched vulnerabilitiesIoT attacksmajor cybersecurity incidents
spellingShingle Olufunsho I. Falowo
Saheed Popoola
Josette Riep
Victor A. Adewopo
Jacob Koch
Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity Incidents
IEEE Access
Data breach
DoS attacks
DDoS attacks
exploits of unpatched vulnerabilities
IoT attacks
major cybersecurity incidents
title Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity Incidents
title_full Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity Incidents
title_fullStr Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity Incidents
title_full_unstemmed Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity Incidents
title_short Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity Incidents
title_sort threat actors x2019 tenacity to disrupt examination of major cybersecurity incidents
topic Data breach
DoS attacks
DDoS attacks
exploits of unpatched vulnerabilities
IoT attacks
major cybersecurity incidents
url https://ieeexplore.ieee.org/document/9998178/
work_keys_str_mv AT olufunshoifalowo threatactorsx2019tenacitytodisruptexaminationofmajorcybersecurityincidents
AT saheedpopoola threatactorsx2019tenacitytodisruptexaminationofmajorcybersecurityincidents
AT josetteriep threatactorsx2019tenacitytodisruptexaminationofmajorcybersecurityincidents
AT victoraadewopo threatactorsx2019tenacitytodisruptexaminationofmajorcybersecurityincidents
AT jacobkoch threatactorsx2019tenacitytodisruptexaminationofmajorcybersecurityincidents