Hakak Saqib, Khan Wazir Zada, Imran Muhammad, Choo Kim-Kwang Raymond, Shoaib Muhammad
Faculty of Computer ScienceUniversity of Northern British ColumbiaPrince GeorgeBCV2N 4Z9Canada.
Faculty of CS & ISJazan UniversityJazan45142Saudi Arabia.
IEEE Access. 2020 Jun 30;8:124134-124144. doi: 10.1109/ACCESS.2020.3006172. eCollection 2020.
Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, and stay-at-home orders, consequently increasing the reliance on information and communications technologies, such as Zoom. Cybercriminals have also attempted to exploit the pandemic to facilitate a broad range of malicious activities, such as attempting to take over videoconferencing platforms used in online meetings/educational activities, information theft, and other fraudulent activities. This study briefly reviews some of the malicious cyber activities associated with COVID-19 and the potential mitigation solutions. We also propose an attack taxonomy, which (optimistically) will help guide future risk management and mitigation responses.
网络犯罪分子一直在寻找新的攻击途径,最近的新冠疫情也不例外。例如,社交距离措施导致了旅行禁令、封锁和居家令,从而增加了对诸如Zoom等信息和通信技术的依赖。网络犯罪分子还试图利用疫情来实施一系列恶意活动,比如试图接管在线会议/教育活动中使用的视频会议平台、信息盗窃及其他欺诈活动。本研究简要回顾了一些与新冠疫情相关的恶意网络活动以及潜在的缓解解决方案。我们还提出了一种攻击分类法,(乐观地讲)这将有助于指导未来的风险管理和缓解应对措施。