5 Sep 2022

56

Stuxnet and Other Famous Malware

Format: APA

Academic level: College

Paper type: Annotated Bibliography

Words: 255

Pages: 1

Downloads: 0

Nelson, N. (2016). The impact of dragonfly malware on industrial control systems.  SANS Institute

In this article, Nelson discusses the Dragonfly malware, an instance of cybercrime similar to the Stuxnet computer worm incident. In June 2014, Dragonfly malware was detected. Just like Stuxnet, this malware was designed to attack industrial control systems (ICSs) across the United States and Europe. According to Nelson, the attack was conducted in an orchestrated manner over a long period. In addition, the attack used infection methods that were not only difficult to detect but also difficult to thwart. Nelson explores the manner in which Dragonfly malware infiltrated business systems and the impact of the malware on infected systems. With regard to the manner in which Dragonfly attack was orchestrated, the attack was three-phased and used spear-phishing campaign to infect victims, a remote access Trojan horse (RAT) to access systems, and used a software named Havex in watering hole attacks. Although the attackers did not cause any destruction of property, they compromised the computer systems of energy companies in the United States and Europe. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Cherepanov, A. (2017). WIN32/INDUSTROYER: A new threat for industrial control systems.  White paper, ESET (June 2017). 

In this article, Cherepanov discusses the Industoyer malware, the biggest threat to ICSs since Stuxnet. This malware was designed to disrupt the working processes of ICSs used in electrical substations. In December 2016, Industroyer was used to shut down the power grid in Kieve, Ukraine’s capital. This malware had the ability to attack power grids automatically. Industroyer contains multiple modules and is capable of doing significant harm to electric power grids. Other than ICSs, this malware can also be refitted to target other types of critical infrastructures, such as transportation control systems. Compared to Stuxnet, Industroyer malware is more advanced as well as more sophisticated piece of malware that is used against ICSs. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Stuxnet and Other Famous Malware.
https://studybounty.com/stuxnet-and-other-famous-malware-annotated-bibliography

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 165

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 183

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration