IJIEEB Vol. 13, No. 2, 8 Apr. 2021
Cover page and Table of Contents: PDF (size: 477KB)
Cybercrimes, cyber-attacks, malware, COVID-19, work-from-home.
COVID-19 pandemic has changed the lifestyle of all aspects of life. These circumstances have created new patterns in lifestyle that people had to deal with. As such, full and direct dependence on the use of the unsafe Internet network in running all aspects of life. As example, many organizations started officially working through the Internet, students moved to e-education, online shopping increased, and more. These conditions have created a fertile environment for cybercriminals to grow their activity and exploit the pressures that affected human psychology to increase their attack success. The purpose of this paper is to analyze the data collected from global online fraud and cybersecurity service companies to demonstrate on how cybercrimes increased during the COVID-19 epidemic. The significance and value of this research is to highlight by evident on how criminals exploit crisis, and for the need to develop strategies and to enhance user awareness for better detection and prevention of future cybercrimes.
Raghad Khweiled, Mahmoud Jazzar, Derar Eleyan, "Cybercrimes during COVID -19 Pandemic ", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.13, No.2, pp. 1-10, 2021. DOI:10.5815/ijieeb.2021.02.01
[1]WHO, “WHO Coronavirus Disease (COVID-19) Dashboard,” https://covid19.who.int/, Retrieved July 13, 2020.
[2]R. Naidoo, “A multi-level influence model of COVID-19 themed cybercrime,” Eur. J. Inf. Syst., vol. 29, no. 3, pp. 306–321, May 2020, doi: 10.1080/0960085X.2020.1771222.
[3]Interpol, “Cybercrime : Covid-19 Impact,” https://www.interpol.int, Retrieved July 18, 2020.
[4]T. Seals, “WHO Targeted in Espionage Attempt, COVID-19 Cyberattacks Spike | Threatpost,” https://threatpost.com/who- attacked-possible-apt-covid-19-cyberattacks-double/154083/, Retrieved July 18, 2020.
[5]S. Morgan, “Cybercrime To Cost The World $10.5 Trillion Annually By 2025,” https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/, Retrieved July 18, 2020.
[6]M. Chawki, A. Darwish, M. A. Khan, and S. Tyagi, Cybercrime,Digital Forensics and Jurisdiction, SCI, Volume 593, 2018.
[7]D. L. Shinder and M. Cross, Scene of the Cybercrime, Burlington, MA: Syngress Pub., 2008.
[8]R. W. Taylor, E. J. Fritsch, and J. Liederbach, Digital Crime and Digital Terrorism, 3rd ed., Pearson, 2015.
[9]R. W. Taylor, E. J. Fritsch, and J. Liederbach, Digital Crime and Digital Terrorism, 3rd ed., Pearson, 2015.
[10]J. R. C. Nurse, “Cybercrime and you: How criminals attack and the human factors that they seek to exploit,” arXiv, 2018, doi: 10.1093/oxfordhb/9780198812746.013.35.
[11]K. Tysiac, “How cyber criminals prey on victims of natural disasters,” https://www.journalofaccountancy.com/news/2018/sep/cyber-criminals-prey-on-natural-disaster-victims-201819720.html, Retrieved December 13, 2020.
[12]FBI, “Hurricane Katrina Fraud,” https://www.fbi.gov/history/famous-cases/hurricane-katrina-fraud, Retrieved Nov. 28, 2020.
[13]FBI, “FBI Cyber Executive Warns of Hurricane Katrina Scams,” https://archives.fbi.gov/archives/news/stories/2005/september/katrina_scams091405, Retrieved Nov. 28, 2020.
[14]CISA, “Ebola Phishing Scams and Malware Campaigns ,” https://us-cert.cisa.gov/ncas/current-activity/2014/10/16/Ebola-Phishing-Scams-and-Malware-Campaigns, Retrieved Nov. 29, 2020.
[15]M. Korolov, “Scammers move from Ebola phishing to fundraising | CSO Online,” https://www.csoonline.com/article/2848481/scammers-move-from-ebola-phishing-to-fundraising.html, Retrieved Dec. 28, 2020.
[16]Cybertalk, “Nearly 200,000 coronavirus themed threats in 7 days - CyberTalk.org,” https://www.cybertalk.org/2020/05/14/nearly-200000-coronavirus-themed-threats-in-7-days/, Retrieved Nov. 28, 2020.
[17]TrendMicro, “Securing the Workplace Trend Micro 2020 Midyear Cybersecurity Report,” https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/securing-the-pandemic-disrupted-workplace-trend-micro-2020-midyear-cybersecurity-report, Retrieved Nov. 28, 2020.
[18]ThreatIntelligenceTeam, “Fake ‘Corona Antivirus’ distributes BlackNET remote administration tool,” https://blog.malwarebytes.com/threat-analysis/2020/03/fake-corona-antivirus-distributes-blacknet-remote-administration-tool, Retrieved Nov. 28, 2020.
[19]APWG, “Phishing Activity Trends Report in Q1 of 2020,” Available: https://docs.apwg.org/reports/apwg_trends_report_q1_2020.pdf., Retrieved Dec. 12, 2020.
[20]APWG, “Phishing Activity Trends Report in Q2 of 2020.” Available: https://docs.apwg.org/reports/apwg_trends_report_q2_2020.pdf., Retrieved Dec. 12, 2020.
[21]Coalition Inc., “Cyber Insurance Claims Report,” Available: https://www.coalitioninc.com/blog/coalition-releases-new-2020-cyber-insurance-claims-report, Retrieved Dec. 13, 2020.
[22]TrendMicro, “QNodeService: Node.js Trojan Spread via Covid-19 Lure,” https://blog.trendmicro.com/trendlabs-security-intelligence/qnodeservice-node-js-trojan-spread-via-covid-19-lure/, Retrieved Dec. 5, 2020.
[23]T. Saleh, “CovidLock Update: Deeper Analysis of Coronavirus Android Ransomware,” https://www.domaintools.com/resources/blog/covidlock-update-coronavirus-ransomware, Retrieved Dec. 23, 2020.
[24]U. Bangkok, “Fake news’ in the time of COVID-19,” https://bangkok.unesco.org/content/press-provides-antidote-fake-news-time-covid-19, Retrieved Dec. 24, 2020.
[25]S. Evanega, M. Lynas, J. Adams, and K. Smolenyak, “Coronavirus misinformation: quantifying sources and themes in the COVID-19’infodemic’,” Available: https://allianceforscience.cornell.edu/wp-content/uploads/2020/10/Evanega-et-al-Coronavirus-misinformation-submitted_07_23_20-1.pdf, Retrieved Dec. 24, 2020.
[26]G. Pennycook, J. McPhetres, Y. Zhang, J. G. Lu, and D. G. Rand, “Fighting COVID-19 Misinformation on Social Media: Experimental Evidence for a Scalable Accuracy-Nudge Intervention,” Psychol. Sci., vol. 31, no. 7, pp. 770–780, 2020, doi: 10.1177/0956797620939054.
[27]Neustar, “Cyber threats & trends: JAN-JUN 2020,” Availabe: https://www.cdn.neustar/resources/whitepapers/security/neustar-cyber-threats-trends-report-2020.pdf, Retrieved Dec. 23, 2020.
[28]SecurityExpert, “Top Five Most Infamous DDoS Attacks - Security Boulevard,” https://securityboulevard.com/2020/09/top-five-most-infamous-ddos-attacks/, Retrieved Dec. 23, 2020.
[29]Netscout, “NETSCOUT Threat Intelligence Report - Cybercrime: Exploiting A Pandemic," https://www.netscout.com/blog/netscout-threat-intelligence-report-1H2020, Accessed: Dec. 23, 2020.
[30]E. Nakashima and C. Timberg, “Russian hacker group ‘Cozy Bear’ behind Treasury and Commerce breaches - The Washington Post,” Available: https://www.washingtonpost.com/national-security/russian-government-spies-are-behind-a-broad-hacking-campaign-that-has-breached-us-agencies-and-a-top-cyber-firm/2020/12/13/d5a53b88-3d7d-11eb-9453-fc36ba051781_story.html, Accessed Dec. 24, 2020.
[31]L. Constantin, “SolarWinds attack explained: And why it was so hard to detect,” https://www.csoonline.com/article/3601508/solarwinds-supply-chain-attack-explained-why-organizations-were-not-prepared.html, Accessed Dec. 24, 2020.
[32]BBCNews, “US cyber-attack: US energy department confirms it was hit by Sunburst hack,” https://www.bbc.com/news/world-us-canada-55358332, Accessed Dec. 24, 2020.
[33]N. Kumaran and S. Lugani, “Protecting against cyber threats during COVID-19 and beyond,” https://cloud.google.com/blog/products/identity-security/protecting-against-cyber-threats-during-covid-19-and-beyond, Accessed Dec. 13, 2020.
[34]A. A. Süzen, "A Risk-Assessment of Cyber Attacks and Defense Strategies in Industry 4.0 Ecosystem," International Journal of Computer Network and Information Security, Vol.12, No.1, pp.1-12, 2020.
[35]Q. A. Ul Haq,"Cyber Security and Analysis of Cyber-Crime Laws to Restrict Cyber Crime in Pakistan," International Journal of Computer Network and Information Security, Vol.11, No.1, pp.62-69, 2019.