Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies

Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, and stay-at-home orders, consequently increasing the reliance on information and communications tech...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2020-01, Vol.8, p.124134-124144
Hauptverfasser: Hakak, Saqib, Khan, Wazir Zada, Imran, Muhammad, Choo, Kim-Kwang Raymond, Shoaib, Muhammad
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 124144
container_issue
container_start_page 124134
container_title IEEE access
container_volume 8
creator Hakak, Saqib
Khan, Wazir Zada
Imran, Muhammad
Choo, Kim-Kwang Raymond
Shoaib, Muhammad
description Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, and stay-at-home orders, consequently increasing the reliance on information and communications technologies, such as Zoom. Cybercriminals have also attempted to exploit the pandemic to facilitate a broad range of malicious activities, such as attempting to take over videoconferencing platforms used in online meetings/educational activities, information theft, and other fraudulent activities. This study briefly reviews some of the malicious cyber activities associated with COVID-19 and the potential mitigation solutions. We also propose an attack taxonomy, which (optimistically) will help guide future risk management and mitigation responses.
doi_str_mv 10.1109/ACCESS.2020.3006172
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_ACCESS_2020_3006172</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9129700</ieee_id><doaj_id>oai_doaj_org_article_dcc3c7215f4144b0b668fb5802db43ba</doaj_id><sourcerecordid>2547530399</sourcerecordid><originalsourceid>FETCH-LOGICAL-c562t-98cc3f4806097c597a910def0e4cad49600ba6487e88b942a5c9919ed57b4853</originalsourceid><addsrcrecordid>eNpdkk9v1DAQxSMEolXpJ-jFEhcOZBn_S-wLqIRCVyqqxK4qcbIcZ7J4lcStk6zYb4_LriqKLx6N3_uNbb0su6CwoBT0h8uqulqtFgwYLDhAQUv2IjtltNA5l7x4-U99kp2P4xbSUqkly9fZCRdUM0r5aba5tjskP8NMPiMOxJI77ybfk9CS6vZu-SWnOv-BnZ2wIdW-xkiWg_MNDtP4iazmuMP9e7K2v8MQ-lTZoSHf_eQ3dvJhIKspJufG4_gme9XabsTz436Wrb9eravr_Ob227K6vMmdLNiUa-Ucb4WCAnTppC6tptBgCyicbYQuAGpbCFWiUrUWzEqnNdXYyLIWSvKzbHnANsFuzX30vY17E6w3fxshboyNk3cdmiZNciWjshVUiBrqolBtLRWwpha8ton18cC6n-seG5feHG33DPr8ZPC_zCbsjALBhVYJ8O4IiOFhxnEyvR8ddp0dMMyjYVKUkgPXOknf_ifdhjkO6acME1IUgtESkoofVC6GcYzYPl2GgnmMhTnEwjzGwhxjkVwXB5dHxCeHpkyXAPwPzDWwHg</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2454642170</pqid></control><display><type>article</type><title>Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Hakak, Saqib ; Khan, Wazir Zada ; Imran, Muhammad ; Choo, Kim-Kwang Raymond ; Shoaib, Muhammad</creator><creatorcontrib>Hakak, Saqib ; Khan, Wazir Zada ; Imran, Muhammad ; Choo, Kim-Kwang Raymond ; Shoaib, Muhammad</creatorcontrib><description>Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, and stay-at-home orders, consequently increasing the reliance on information and communications technologies, such as Zoom. Cybercriminals have also attempted to exploit the pandemic to facilitate a broad range of malicious activities, such as attempting to take over videoconferencing platforms used in online meetings/educational activities, information theft, and other fraudulent activities. This study briefly reviews some of the malicious cyber activities associated with COVID-19 and the potential mitigation solutions. We also propose an attack taxonomy, which (optimistically) will help guide future risk management and mitigation responses.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2020.3006172</identifier><identifier>PMID: 34192113</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Communications Technology ; Computational and Artificial Intelligence ; Computer crime ; Computers and Information Processing ; Coronaviruses ; COVID-19 ; cyberattacks ; Disease control ; Internet-of-Things Attacks and Defenses: Recent Advances and Challenges ; mitigation ; Pandemics ; potential solutions ; Privacy ; Risk management ; security and privacy ; Taxonomy ; Theft ; Videoconferencing</subject><ispartof>IEEE access, 2020-01, Vol.8, p.124134-124144</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><rights>This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ 2020</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c562t-98cc3f4806097c597a910def0e4cad49600ba6487e88b942a5c9919ed57b4853</citedby><cites>FETCH-LOGICAL-c562t-98cc3f4806097c597a910def0e4cad49600ba6487e88b942a5c9919ed57b4853</cites><orcidid>0000-0002-6946-2591 ; 0000-0002-0051-6803 ; 0000-0001-9208-5336 ; 0000-0003-0819-4236 ; 0000-0002-6670-1032</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9129700$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>230,314,776,780,860,881,2096,27610,27901,27902,54908</link.rule.ids></links><search><creatorcontrib>Hakak, Saqib</creatorcontrib><creatorcontrib>Khan, Wazir Zada</creatorcontrib><creatorcontrib>Imran, Muhammad</creatorcontrib><creatorcontrib>Choo, Kim-Kwang Raymond</creatorcontrib><creatorcontrib>Shoaib, Muhammad</creatorcontrib><title>Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies</title><title>IEEE access</title><addtitle>Access</addtitle><description>Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, and stay-at-home orders, consequently increasing the reliance on information and communications technologies, such as Zoom. Cybercriminals have also attempted to exploit the pandemic to facilitate a broad range of malicious activities, such as attempting to take over videoconferencing platforms used in online meetings/educational activities, information theft, and other fraudulent activities. This study briefly reviews some of the malicious cyber activities associated with COVID-19 and the potential mitigation solutions. We also propose an attack taxonomy, which (optimistically) will help guide future risk management and mitigation responses.</description><subject>Communications Technology</subject><subject>Computational and Artificial Intelligence</subject><subject>Computer crime</subject><subject>Computers and Information Processing</subject><subject>Coronaviruses</subject><subject>COVID-19</subject><subject>cyberattacks</subject><subject>Disease control</subject><subject>Internet-of-Things Attacks and Defenses: Recent Advances and Challenges</subject><subject>mitigation</subject><subject>Pandemics</subject><subject>potential solutions</subject><subject>Privacy</subject><subject>Risk management</subject><subject>security and privacy</subject><subject>Taxonomy</subject><subject>Theft</subject><subject>Videoconferencing</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpdkk9v1DAQxSMEolXpJ-jFEhcOZBn_S-wLqIRCVyqqxK4qcbIcZ7J4lcStk6zYb4_LriqKLx6N3_uNbb0su6CwoBT0h8uqulqtFgwYLDhAQUv2IjtltNA5l7x4-U99kp2P4xbSUqkly9fZCRdUM0r5aba5tjskP8NMPiMOxJI77ybfk9CS6vZu-SWnOv-BnZ2wIdW-xkiWg_MNDtP4iazmuMP9e7K2v8MQ-lTZoSHf_eQ3dvJhIKspJufG4_gme9XabsTz436Wrb9eravr_Ob227K6vMmdLNiUa-Ucb4WCAnTppC6tptBgCyicbYQuAGpbCFWiUrUWzEqnNdXYyLIWSvKzbHnANsFuzX30vY17E6w3fxshboyNk3cdmiZNciWjshVUiBrqolBtLRWwpha8ton18cC6n-seG5feHG33DPr8ZPC_zCbsjALBhVYJ8O4IiOFhxnEyvR8ddp0dMMyjYVKUkgPXOknf_ifdhjkO6acME1IUgtESkoofVC6GcYzYPl2GgnmMhTnEwjzGwhxjkVwXB5dHxCeHpkyXAPwPzDWwHg</recordid><startdate>20200101</startdate><enddate>20200101</enddate><creator>Hakak, Saqib</creator><creator>Khan, Wazir Zada</creator><creator>Imran, Muhammad</creator><creator>Choo, Kim-Kwang Raymond</creator><creator>Shoaib, Muhammad</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-6946-2591</orcidid><orcidid>https://orcid.org/0000-0002-0051-6803</orcidid><orcidid>https://orcid.org/0000-0001-9208-5336</orcidid><orcidid>https://orcid.org/0000-0003-0819-4236</orcidid><orcidid>https://orcid.org/0000-0002-6670-1032</orcidid></search><sort><creationdate>20200101</creationdate><title>Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies</title><author>Hakak, Saqib ; Khan, Wazir Zada ; Imran, Muhammad ; Choo, Kim-Kwang Raymond ; Shoaib, Muhammad</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c562t-98cc3f4806097c597a910def0e4cad49600ba6487e88b942a5c9919ed57b4853</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Communications Technology</topic><topic>Computational and Artificial Intelligence</topic><topic>Computer crime</topic><topic>Computers and Information Processing</topic><topic>Coronaviruses</topic><topic>COVID-19</topic><topic>cyberattacks</topic><topic>Disease control</topic><topic>Internet-of-Things Attacks and Defenses: Recent Advances and Challenges</topic><topic>mitigation</topic><topic>Pandemics</topic><topic>potential solutions</topic><topic>Privacy</topic><topic>Risk management</topic><topic>security and privacy</topic><topic>Taxonomy</topic><topic>Theft</topic><topic>Videoconferencing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hakak, Saqib</creatorcontrib><creatorcontrib>Khan, Wazir Zada</creatorcontrib><creatorcontrib>Imran, Muhammad</creatorcontrib><creatorcontrib>Choo, Kim-Kwang Raymond</creatorcontrib><creatorcontrib>Shoaib, Muhammad</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hakak, Saqib</au><au>Khan, Wazir Zada</au><au>Imran, Muhammad</au><au>Choo, Kim-Kwang Raymond</au><au>Shoaib, Muhammad</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2020-01-01</date><risdate>2020</risdate><volume>8</volume><spage>124134</spage><epage>124144</epage><pages>124134-124144</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, and stay-at-home orders, consequently increasing the reliance on information and communications technologies, such as Zoom. Cybercriminals have also attempted to exploit the pandemic to facilitate a broad range of malicious activities, such as attempting to take over videoconferencing platforms used in online meetings/educational activities, information theft, and other fraudulent activities. This study briefly reviews some of the malicious cyber activities associated with COVID-19 and the potential mitigation solutions. We also propose an attack taxonomy, which (optimistically) will help guide future risk management and mitigation responses.</abstract><cop>Piscataway</cop><pub>IEEE</pub><pmid>34192113</pmid><doi>10.1109/ACCESS.2020.3006172</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0002-6946-2591</orcidid><orcidid>https://orcid.org/0000-0002-0051-6803</orcidid><orcidid>https://orcid.org/0000-0001-9208-5336</orcidid><orcidid>https://orcid.org/0000-0003-0819-4236</orcidid><orcidid>https://orcid.org/0000-0002-6670-1032</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2020-01, Vol.8, p.124134-124144
issn 2169-3536
2169-3536
language eng
recordid cdi_crossref_primary_10_1109_ACCESS_2020_3006172
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Communications Technology
Computational and Artificial Intelligence
Computer crime
Computers and Information Processing
Coronaviruses
COVID-19
cyberattacks
Disease control
Internet-of-Things Attacks and Defenses: Recent Advances and Challenges
mitigation
Pandemics
potential solutions
Privacy
Risk management
security and privacy
Taxonomy
Theft
Videoconferencing
title Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T08%3A44%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Have%20You%20Been%20a%20Victim%20of%20COVID-19-Related%20Cyber%20Incidents?%20Survey,%20Taxonomy,%20and%20Mitigation%20Strategies&rft.jtitle=IEEE%20access&rft.au=Hakak,%20Saqib&rft.date=2020-01-01&rft.volume=8&rft.spage=124134&rft.epage=124144&rft.pages=124134-124144&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2020.3006172&rft_dat=%3Cproquest_cross%3E2547530399%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2454642170&rft_id=info:pmid/34192113&rft_ieee_id=9129700&rft_doaj_id=oai_doaj_org_article_dcc3c7215f4144b0b668fb5802db43ba&rfr_iscdi=true