Page 12 - Cyberattacks and Cyberscams: Is There an End in Sight?
P. 12
strategies for, 38–40 Hickey, Matthew, 36
through basic cyberhygiene, 52
through extension of Geneva identity fraud, 13–15
Conventions, 54–55 initial access broker (IAB), 23
Cyber Operations Tracker Internet Crime Complaint
(Council on Foreign Relations), Center (IC3, Federal Bureau of
60 Investigation), 60
CyberSeek (website), 55, 60
Cyberspace Solarium Jensen, Benjamin, 45
Commission, 5, 56
Kaseya hacking (2021), 4–5, 47
Darknet Diaries (podcast), 60 Kinzinger, Adam, 13
DarkSide (RaaS group), 17–18, Knake, Robert K.
23 on asymmetric risk to US from
Davidoff, Sherri, 37 cyberoffense, 30, 31
defend forward strategy, 41, 44, on cybersecurity, 56
45 on goal of cybersecurity, 7
Department of Defense, US, 28, on quantum computing, 49
43 on Stuxnet, 29
Department of Homeland
Security, US (DHS), 46, 51, 52 Lake City (FL) ransomware
Department of Justice, US, 26 attack (2019), 24, 25
Department of Transportation, Lawfare Institute, 60
US, 18 Ledgett, Rick, 35
Lessig, Hugh, 10
employment fraud, 8–10
encryption, 49–50 machine learning, 48–49
e-skimming, 15 malware, 15, 32
phishing scams and, 21, 27
Fancy Bear (Russian hacker zero-days in delivery of, 36
group), 34 Mandia, Kevin, 27
Farshchi, Jamil, 53 Marañon, Alvaro, 20
FireEye (cybersecurity fi rm), 23, Mehrotra, Kartikay, 26
27, 28, 40 Mitrokhin, Vasili, 31
Montgomery, Mark, 26
Garriott, Ashton, 48 Musser, Micah, 48
Geneva Conventions, 54–55
grandparent scams, 16 Nakashima, Ellen, 35
Greenberg, Andy, 32 Nakasone, Paul M., 41, 41,
44
Harknett, Richard J., 41 Natanz nuclear facility (Iran),
Harris, Shane, 35 29, 30
63