1. Shadow brokers sought to gain monetary compensation by extorting governments and individuals
2. Sought to bring attention to the abuse of power it perceived the United States National Security Agency (NSA) was developing for spying on other nations.
3. Obtain notoriety on a global scale
• Resources required:
• Skills and/or training-
1. Extensive knowledge of writing and discerning code.
2. Exceptional computer skills in hacking
3. Courses or practical expertise in operating on computers
• Preparation time- Unknown
• Personnel- Unknown- at a minimum One person with exceptional knowledge of operating systems, network and computer skills with multitude of assets to assist in obtaining information.
• …show more content…
Larger companies can place a network administrator to monitor servers for updates and back ups
3. Implementation of backup drives for data recovery in the event of future incidents
• References: Appear at the end of the case study outline given next.
Attack Case Study
• Overview: On 12 May 2017, the United Kingdom’s National Health Service (NHS) attacked by, “WannaCry” a ransomware attack that crippled the NHS and hit thousands of computers around the world in (Chapelle, 2017, para 1). The ransomware was developed by the NSA and was acquired for nefarious reasons by Shadow brokers in hopes to obtain monetary gains and notoriety in the world community. The attack had little impact on internet use but the social aspect of the event caused trepidation in surfing or opening emails from fear of infection.
• Perpetrator: The malicious attack is attributed to Shadow brokers. This organization operates in secrecy and is attributed for utilizing obtained information for exposing government agencies covert operations against its populace.
• Attack scenario: See above
• Risk …show more content…
Monitor security controls: All updates will send notification to users for updates in the event a patch or antivirus software is not updates system administrators can push updates without user’s authorization.
• References: a list of authoritative references used in the attack scenario and in other sections of the case study (Smith, 2016, pg. 68).
Jopson, B., & Kuchler, H. (2017). US defends NSA over WannaCry cyber attack. FT.Com, Retrieved from https://search-proquest-com.ezproxy2.apus.edu/docview/1909947830?accountid=8289
Selyukh, A. (2017). Long before 'WannaCry' ransomware, decades of cyber 'wake-up calls'. Washington: NPR. Retrieved from https://search-proquest-com.ezproxy2.apus.edu/docview/1899183301?accountid=8289
Chappell, B. (2017). Britain says north Korea was likely behind WannaCry attack that hit hospitals. Washington: NPR. Retrieved from https://search-proquest-com.ezproxy1.apus.edu/docview/1956319763?pq-origsite=summon&accountid=8289
O'Dwyer, D. (2017, May 15). Attack signals escalation in cyber warfare. Irish Times Retrieved from https://search-proquest-com.ezproxy2.apus.edu/docview/1898592212?accountid=8289
Smith, R. E. (2016). Elementary Information Security, 2nd Edition. [Bookshelf Online]. Retrieved from