Ransomware Attack Case Study

Improved Essays
Attack Scenario
• Goals:
1. Shadow brokers sought to gain monetary compensation by extorting governments and individuals
2. Sought to bring attention to the abuse of power it perceived the United States National Security Agency (NSA) was developing for spying on other nations.
3. Obtain notoriety on a global scale
• Resources required:
• Skills and/or training-
1. Extensive knowledge of writing and discerning code.
2. Exceptional computer skills in hacking
3. Courses or practical expertise in operating on computers
• Preparation time- Unknown
• Personnel- Unknown- at a minimum One person with exceptional knowledge of operating systems, network and computer skills with multitude of assets to assist in obtaining information.
…show more content…
Larger companies can place a network administrator to monitor servers for updates and back ups
3. Implementation of backup drives for data recovery in the event of future incidents
• References: Appear at the end of the case study outline given next.
Attack Case Study
• Overview: On 12 May 2017, the United Kingdom’s National Health Service (NHS) attacked by, “WannaCry” a ransomware attack that crippled the NHS and hit thousands of computers around the world in (Chapelle, 2017, para 1). The ransomware was developed by the NSA and was acquired for nefarious reasons by Shadow brokers in hopes to obtain monetary gains and notoriety in the world community. The attack had little impact on internet use but the social aspect of the event caused trepidation in surfing or opening emails from fear of infection.
• Perpetrator: The malicious attack is attributed to Shadow brokers. This organization operates in secrecy and is attributed for utilizing obtained information for exposing government agencies covert operations against its populace.
• Attack scenario: See above
• Risk
…show more content…
Monitor security controls: All updates will send notification to users for updates in the event a patch or antivirus software is not updates system administrators can push updates without user’s authorization.
• References: a list of authoritative references used in the attack scenario and in other sections of the case study (Smith, 2016, pg. 68).
Jopson, B., & Kuchler, H. (2017). US defends NSA over WannaCry cyber attack. FT.Com, Retrieved from https://search-proquest-com.ezproxy2.apus.edu/docview/1909947830?accountid=8289
Selyukh, A. (2017). Long before 'WannaCry' ransomware, decades of cyber 'wake-up calls'. Washington: NPR. Retrieved from https://search-proquest-com.ezproxy2.apus.edu/docview/1899183301?accountid=8289
Chappell, B. (2017). Britain says north Korea was likely behind WannaCry attack that hit hospitals. Washington: NPR. Retrieved from https://search-proquest-com.ezproxy1.apus.edu/docview/1956319763?pq-origsite=summon&accountid=8289
O'Dwyer, D. (2017, May 15). Attack signals escalation in cyber warfare. Irish Times Retrieved from https://search-proquest-com.ezproxy2.apus.edu/docview/1898592212?accountid=8289
Smith, R. E. (2016). Elementary Information Security, 2nd Edition. [Bookshelf Online]. Retrieved from

Related Documents

  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    the core team of network administrators. Any major change in the base server configurations should alert the core team. Also, the antivirus software must be kept up-to-date on all machines to protect the University from future…

    • 671 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Target Breach Case Study

    • 675 Words
    • 3 Pages

    Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    John Parachini Case Study

    • 790 Words
    • 4 Pages

    This paper will also relate the threat of this type of attack with the risk management perspectives…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The aim of this paper is to outline the dynamics of Walters Security. Walters Security’s main objective is to ensure a high level of network and information security for reach client. Customer and client information, payment information, personal files, bank account details- all this information cannot be fully restored once it has been lost or breached by criminals. The goal of this firm is developing an interdisciplinary research platform to develop a framework and provide benefits to eliminate breach-related vulnerability of information.…

    • 762 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Our recommendation to the National Security Council is to pursue Policy #4, using a honeynet to trap attackers and provide attribution. This technical solution is far more covert than our other alternative policies. It allows us to obtain knowledge about hackers’ methods and means of attack during their attempts to infiltrating sensitive data. Most importantly, it could potentially provide irrefutable evidence for attribution. This evidence enables the US to impose harsher sanctions without fear of a backlash.…

    • 381 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ransom Ware Case Study

    • 421 Words
    • 2 Pages

    Case Project 2-5 Ransom ware is a program that prevents a user’s device from properly operating until a fee is paid. Ransom ware is malware that is highly profitable. Variation of ransom ware displays a fictitious warning that there is a problem with your computer, even if your computer is old or new, ransom ware reports the same problem. There are many types of ransom attacks, FBI warnings saying that you are a victim of child pornography is one that is most common and something we see on our computers today. A recent ransom ware attack happened in Hollywood.…

    • 421 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Homeland Security Thesis

    • 670 Words
    • 3 Pages

    An introductory text for the 21st Century (11th ed.). Upper Saddle River, NY: Prentice Hall. Annotated Bibliography Bullock, J. A., Haddow, G. & Coppola, D. P. (2013). Introduction to Homeland Security (4th ed.). Waltham, MA: Butterworth-Heinemann.…

    • 670 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Introduction The reason for the article is to stress the importance of information security to any organization. The problem presently is that many organizations either do not have enough security or they have a lack of interest in the security measures as it pertains to their individual organization. The solution to this is that organizations must ensure they have a proper balance and remain vigilant at all times. This means remaining flexible as well as adaptable to the situation of the day.…

    • 967 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Background Information Crowdsourcing information security uses the reach of crowdsourcing to tackle problems involving information security and cyber security. To effectively crowdsource a task, especially in information security, three criteria must be met: • First, the crowdsourcing task must be solvable by a large group. • Second, the requester must have access to a large group of people that work either collaboratively or independently toward a solution. • Third, the requester needs to attract these people to engage in a crowdsourcing task via an open call (Hetmank, 2014).…

    • 1293 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    The Computer Fraud and Abuse Act (CFAA) of 1986 was created during the Reagan Administration as the first significant federal legislation designed to combat the growing threat against computer based crimes. In the 1980 's, Congress would only have the vaguest of notions how computer technology would evolve as a medium for communications and social-networking. Lawmakers, at the time, recognized the federal interest of the U.S. government was to protect computers under control of a federal entity, part of a financial institution or somehow involved in interstate or foreign commerce. The CFAA was therefore a crucial piece of legislation that protected U.S. interest in terms of national security and financial information.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays