Beyond the Firewall: Tackling Cyberattacks Through Advanced Methods
By Sayantan Chowdhury, Symbiosis Law School, Nagpur*.
Abstract
On 23rd December 2015, Ukraine had 3 regional electric power distribution companies become inoperative due to Blackenergy3 malware that severely compromised the SCADA network in place, leaving an approximate 225,000 customers in the dark for several hours. It would be later found out that it was a false data injection attack that circumvented the bad data detection scheme and gained remote access to substation breakers. Further, research in this matter revealed just how intricate the attack was with elaborate reconnaissance and multi-layer attack to compromise such integral systems. A decade later, on August 15, 2024, an extortion campaign would be discovered that would target 100,000 domains and their cloud data by utilizing misconfigured.env files.
The following research paper makes in-depth research on the basis of these case studies to understand how personal mindfulness and cyber literacy can avoid such high-stakes cyberattacks. It also furthers deals with recommendations from experts, the need for organizational efforts, and legal counsel who are adept in cyber-attacks and frauds.
Keywords: Cybercrime, Ukraine Blackout, Methods and Prevention Of Cybercrimes, Cyber Law, AWS Ransomware Attack 2024, Personal Cyberliteracy.
* The author is a fifth-year law student pursuing B.A. LL.B. from Symbiosis Law School, Nagpur, Maharashtra.
Comments