CINXE.COM
Cyberattack - Wikipedia
<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-sticky-header-enabled vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Cyberattack - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-sticky-header-enabled vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"80f320aa-ac1b-479a-9735-0bbded6a7560","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Cyberattack","wgTitle":"Cyberattack","wgCurRevisionId":1275153820,"wgRevisionId":1275153820,"wgArticleId":37925700,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["Pages with non-numeric formatnum arguments","Articles with short description","Short description is different from Wikidata","Use dmy dates from August 2019","Use American English from August 2019","All Wikipedia articles written in American English","Articles containing potentially dated statements from 2019","All articles containing potentially dated statements","Articles containing potentially dated statements from 2023", "Pages displaying wikidata descriptions as a fallback via Module:Annotated link","Wikipedia articles with ASCII art","Cyberattacks","Cybercrime","Attacks by method"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Cyberattack","wgRelevantArticleId":37925700,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":40000,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled": false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q4071928","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=["ext.cite.ux-enhancements", "mediawiki.page.media","ext.scribunto.logs","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.growthExperiments.SuggestedEditSession"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&modules=ext.cite.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&only=styles&skin=vector-2022"> <script async="" src="/w/load.php?lang=en&modules=startup&only=scripts&raw=1&skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&modules=site.styles&only=styles&skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.16"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Cyberattack - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Cyberattack"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Cyberattack&action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Cyberattack"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Cyberattack rootpage-Cyberattack skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" title="Main menu" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li><li id="n-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages"><span>Special pages</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page's font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/?wmf_source=donate&wmf_medium=sidebar&wmf_campaign=en.wikipedia.org&uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&returnto=Cyberattack" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&returnto=Cyberattack" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/?wmf_source=donate&wmf_medium=sidebar&wmf_campaign=en.wikipedia.org&uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&returnto=Cyberattack" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&returnto=Cyberattack" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-Definitions" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Definitions"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>Definitions</span> </div> </a> <ul id="toc-Definitions-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Prevalence" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Prevalence"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Prevalence</span> </div> </a> <ul id="toc-Prevalence-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Vulnerability" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Vulnerability"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Vulnerability</span> </div> </a> <ul id="toc-Vulnerability-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Protection" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Protection"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Protection</span> </div> </a> <ul id="toc-Protection-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Attack_process_and_types" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Attack_process_and_types"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>Attack process and types</span> </div> </a> <button aria-controls="toc-Attack_process_and_types-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Attack process and types subsection</span> </button> <ul id="toc-Attack_process_and_types-sublist" class="vector-toc-list"> <li id="toc-Activity" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Activity"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.1</span> <span>Activity</span> </div> </a> <ul id="toc-Activity-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Perpetrators_and_motivations" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Perpetrators_and_motivations"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>Perpetrators and motivations</span> </div> </a> <ul id="toc-Perpetrators_and_motivations-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Targets_and_consequences" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Targets_and_consequences"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>Targets and consequences</span> </div> </a> <button aria-controls="toc-Targets_and_consequences-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Targets and consequences subsection</span> </button> <ul id="toc-Targets_and_consequences-sublist" class="vector-toc-list"> <li id="toc-Consumer_data" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Consumer_data"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.1</span> <span>Consumer data</span> </div> </a> <ul id="toc-Consumer_data-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Critical_infrastructure" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Critical_infrastructure"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.2</span> <span>Critical infrastructure</span> </div> </a> <ul id="toc-Critical_infrastructure-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Corporations_and_organizations" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Corporations_and_organizations"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.3</span> <span>Corporations and organizations</span> </div> </a> <ul id="toc-Corporations_and_organizations-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Governments" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Governments"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.4</span> <span>Governments</span> </div> </a> <ul id="toc-Governments-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Responses" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Responses"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>Responses</span> </div> </a> <button aria-controls="toc-Responses-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Responses subsection</span> </button> <ul id="toc-Responses-sublist" class="vector-toc-list"> <li id="toc-Detection" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Detection"> <div class="vector-toc-text"> <span class="vector-toc-numb">8.1</span> <span>Detection</span> </div> </a> <ul id="toc-Detection-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Recovery" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Recovery"> <div class="vector-toc-text"> <span class="vector-toc-numb">8.2</span> <span>Recovery</span> </div> </a> <ul id="toc-Recovery-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Attribution" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Attribution"> <div class="vector-toc-text"> <span class="vector-toc-numb">8.3</span> <span>Attribution</span> </div> </a> <ul id="toc-Attribution-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Legality" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Legality"> <div class="vector-toc-text"> <span class="vector-toc-numb">9</span> <span>Legality</span> </div> </a> <ul id="toc-Legality-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">10</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">11</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Sources" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Sources"> <div class="vector-toc-text"> <span class="vector-toc-numb">12</span> <span>Sources</span> </div> </a> <ul id="toc-Sources-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" title="Table of Contents" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Cyberattack</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 39 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-39" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">39 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D9%87%D8%AC%D9%88%D9%85_%D8%B3%D9%8A%D8%A8%D8%B1%D8%A7%D9%86%D9%8A" title="هجوم سيبراني – Arabic" lang="ar" hreflang="ar" data-title="هجوم سيبراني" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-az mw-list-item"><a href="https://az.wikipedia.org/wiki/Kiberh%C3%BCcum" title="Kiberhücum – Azerbaijani" lang="az" hreflang="az" data-title="Kiberhücum" data-language-autonym="Azərbaycanca" data-language-local-name="Azerbaijani" class="interlanguage-link-target"><span>Azərbaycanca</span></a></li><li class="interlanguage-link interwiki-bh mw-list-item"><a href="https://bh.wikipedia.org/wiki/%E0%A4%B8%E0%A4%BE%E0%A4%87%E0%A4%AC%E0%A4%B0_%E0%A4%B9%E0%A4%AE%E0%A4%B2%E0%A4%BE" title="साइबर हमला – Bhojpuri" lang="bh" hreflang="bh" data-title="साइबर हमला" data-language-autonym="भोजपुरी" data-language-local-name="Bhojpuri" class="interlanguage-link-target"><span>भोजपुरी</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/Atac_inform%C3%A0tic" title="Atac informàtic – Catalan" lang="ca" hreflang="ca" data-title="Atac informàtic" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-cs mw-list-item"><a href="https://cs.wikipedia.org/wiki/Kybernetick%C3%BD_%C3%BAtok" title="Kybernetický útok – Czech" lang="cs" hreflang="cs" data-title="Kybernetický útok" data-language-autonym="Čeština" data-language-local-name="Czech" class="interlanguage-link-target"><span>Čeština</span></a></li><li class="interlanguage-link interwiki-da mw-list-item"><a href="https://da.wikipedia.org/wiki/Cyberangreb" title="Cyberangreb – Danish" lang="da" hreflang="da" data-title="Cyberangreb" data-language-autonym="Dansk" data-language-local-name="Danish" class="interlanguage-link-target"><span>Dansk</span></a></li><li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/Cyberattacke" title="Cyberattacke – German" lang="de" hreflang="de" data-title="Cyberattacke" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-et mw-list-item"><a href="https://et.wikipedia.org/wiki/K%C3%BCberr%C3%BCnne" title="Küberrünne – Estonian" lang="et" hreflang="et" data-title="Küberrünne" data-language-autonym="Eesti" data-language-local-name="Estonian" class="interlanguage-link-target"><span>Eesti</span></a></li><li class="interlanguage-link interwiki-el mw-list-item"><a href="https://el.wikipedia.org/wiki/%CE%9A%CF%85%CE%B2%CE%B5%CF%81%CE%BD%CE%BF%CE%B5%CF%80%CE%AF%CE%B8%CE%B5%CF%83%CE%B7" title="Κυβερνοεπίθεση – Greek" lang="el" hreflang="el" data-title="Κυβερνοεπίθεση" data-language-autonym="Ελληνικά" data-language-local-name="Greek" class="interlanguage-link-target"><span>Ελληνικά</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/Ciberataque" title="Ciberataque – Spanish" lang="es" hreflang="es" data-title="Ciberataque" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D8%AD%D9%85%D9%84%D9%87_%D8%B3%D8%A7%DB%8C%D8%A8%D8%B1%DB%8C" title="حمله سایبری – Persian" lang="fa" hreflang="fa" data-title="حمله سایبری" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/Cyberattaque" title="Cyberattaque – French" lang="fr" hreflang="fr" data-title="Cyberattaque" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/%EC%82%AC%EC%9D%B4%EB%B2%84_%EA%B3%B5%EA%B2%A9" title="사이버 공격 – Korean" lang="ko" hreflang="ko" data-title="사이버 공격" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-hy mw-list-item"><a href="https://hy.wikipedia.org/wiki/%D4%BF%D5%AB%D5%A2%D5%A5%D6%80%D5%B0%D5%A1%D6%80%D5%B1%D5%A1%D5%AF%D5%B8%D6%82%D5%B4" title="Կիբերհարձակում – Armenian" lang="hy" hreflang="hy" data-title="Կիբերհարձակում" data-language-autonym="Հայերեն" data-language-local-name="Armenian" class="interlanguage-link-target"><span>Հայերեն</span></a></li><li class="interlanguage-link interwiki-hi mw-list-item"><a href="https://hi.wikipedia.org/wiki/%E0%A4%B8%E0%A4%BE%E0%A4%87%E0%A4%AC%E0%A4%B0_%E0%A4%86%E0%A4%95%E0%A5%8D%E0%A4%B0%E0%A4%AE%E0%A4%A3" title="साइबर आक्रमण – Hindi" lang="hi" hreflang="hi" data-title="साइबर आक्रमण" data-language-autonym="हिन्दी" data-language-local-name="Hindi" class="interlanguage-link-target"><span>हिन्दी</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/Serangan_dunia_maya" title="Serangan dunia maya – Indonesian" lang="id" hreflang="id" data-title="Serangan dunia maya" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-is mw-list-item"><a href="https://is.wikipedia.org/wiki/T%C3%B6lvu%C3%A1r%C3%A1s" title="Tölvuárás – Icelandic" lang="is" hreflang="is" data-title="Tölvuárás" data-language-autonym="Íslenska" data-language-local-name="Icelandic" class="interlanguage-link-target"><span>Íslenska</span></a></li><li class="interlanguage-link interwiki-it mw-list-item"><a href="https://it.wikipedia.org/wiki/Attacco_informatico" title="Attacco informatico – Italian" lang="it" hreflang="it" data-title="Attacco informatico" data-language-autonym="Italiano" data-language-local-name="Italian" class="interlanguage-link-target"><span>Italiano</span></a></li><li class="interlanguage-link interwiki-he mw-list-item"><a href="https://he.wikipedia.org/wiki/%D7%94%D7%AA%D7%A7%D7%A4%D7%AA_%D7%A8%D7%A9%D7%AA" title="התקפת רשת – Hebrew" lang="he" hreflang="he" data-title="התקפת רשת" data-language-autonym="עברית" data-language-local-name="Hebrew" class="interlanguage-link-target"><span>עברית</span></a></li><li class="interlanguage-link interwiki-la mw-list-item"><a href="https://la.wikipedia.org/wiki/Cyberias" title="Cyberias – Latin" lang="la" hreflang="la" data-title="Cyberias" data-language-autonym="Latina" data-language-local-name="Latin" class="interlanguage-link-target"><span>Latina</span></a></li><li class="interlanguage-link interwiki-lv mw-list-item"><a href="https://lv.wikipedia.org/wiki/Kiberuzbrukums" title="Kiberuzbrukums – Latvian" lang="lv" hreflang="lv" data-title="Kiberuzbrukums" data-language-autonym="Latviešu" data-language-local-name="Latvian" class="interlanguage-link-target"><span>Latviešu</span></a></li><li class="interlanguage-link interwiki-lt mw-list-item"><a href="https://lt.wikipedia.org/wiki/Kibernetin%C4%97_ataka" title="Kibernetinė ataka – Lithuanian" lang="lt" hreflang="lt" data-title="Kibernetinė ataka" data-language-autonym="Lietuvių" data-language-local-name="Lithuanian" class="interlanguage-link-target"><span>Lietuvių</span></a></li><li class="interlanguage-link interwiki-mn mw-list-item"><a href="https://mn.wikipedia.org/wiki/%D0%9A%D0%B8%D0%B1%D0%B5%D1%80_%D1%85%D0%B0%D0%BB%D0%B4%D0%BB%D0%B0%D0%B3%D0%B0" title="Кибер халдлага – Mongolian" lang="mn" hreflang="mn" data-title="Кибер халдлага" data-language-autonym="Монгол" data-language-local-name="Mongolian" class="interlanguage-link-target"><span>Монгол</span></a></li><li class="interlanguage-link interwiki-my mw-list-item"><a href="https://my.wikipedia.org/wiki/%E1%80%86%E1%80%AD%E1%80%AF%E1%80%80%E1%80%BA%E1%80%98%E1%80%AC%E1%80%90%E1%80%AD%E1%80%AF%E1%80%80%E1%80%BA%E1%80%81%E1%80%AD%E1%80%AF%E1%80%80%E1%80%BA%E1%80%99%E1%80%BE%E1%80%AF" title="ဆိုက်ဘာတိုက်ခိုက်မှု – Burmese" lang="my" hreflang="my" data-title="ဆိုက်ဘာတိုက်ခိုက်မှု" data-language-autonym="မြန်မာဘာသာ" data-language-local-name="Burmese" class="interlanguage-link-target"><span>မြန်မာဘာသာ</span></a></li><li class="interlanguage-link interwiki-ja mw-list-item"><a href="https://ja.wikipedia.org/wiki/%E3%82%B5%E3%82%A4%E3%83%90%E3%83%BC%E6%94%BB%E6%92%83" title="サイバー攻撃 – Japanese" lang="ja" hreflang="ja" data-title="サイバー攻撃" data-language-autonym="日本語" data-language-local-name="Japanese" class="interlanguage-link-target"><span>日本語</span></a></li><li class="interlanguage-link interwiki-no mw-list-item"><a href="https://no.wikipedia.org/wiki/Dataangrep" title="Dataangrep – Norwegian Bokmål" lang="nb" hreflang="nb" data-title="Dataangrep" data-language-autonym="Norsk bokmål" data-language-local-name="Norwegian Bokmål" class="interlanguage-link-target"><span>Norsk bokmål</span></a></li><li class="interlanguage-link interwiki-uz mw-list-item"><a href="https://uz.wikipedia.org/wiki/Kiberhujum" title="Kiberhujum – Uzbek" lang="uz" hreflang="uz" data-title="Kiberhujum" data-language-autonym="Oʻzbekcha / ўзбекча" data-language-local-name="Uzbek" class="interlanguage-link-target"><span>Oʻzbekcha / ўзбекча</span></a></li><li class="interlanguage-link interwiki-pl mw-list-item"><a href="https://pl.wikipedia.org/wiki/Cyberatak" title="Cyberatak – Polish" lang="pl" hreflang="pl" data-title="Cyberatak" data-language-autonym="Polski" data-language-local-name="Polish" class="interlanguage-link-target"><span>Polski</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Ciberataque" title="Ciberataque – Portuguese" lang="pt" hreflang="pt" data-title="Ciberataque" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/%D0%90%D1%82%D0%B0%D0%BA%D0%B0_%D0%BD%D0%B0_%D0%B8%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D1%83%D1%8E_%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D1%83" title="Атака на информационную систему – Russian" lang="ru" hreflang="ru" data-title="Атака на информационную систему" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-simple mw-list-item"><a href="https://simple.wikipedia.org/wiki/Cyberattack" title="Cyberattack – Simple English" lang="en-simple" hreflang="en-simple" data-title="Cyberattack" data-language-autonym="Simple English" data-language-local-name="Simple English" class="interlanguage-link-target"><span>Simple English</span></a></li><li class="interlanguage-link interwiki-sl mw-list-item"><a href="https://sl.wikipedia.org/wiki/Kibernetski_napad" title="Kibernetski napad – Slovenian" lang="sl" hreflang="sl" data-title="Kibernetski napad" data-language-autonym="Slovenščina" data-language-local-name="Slovenian" class="interlanguage-link-target"><span>Slovenščina</span></a></li><li class="interlanguage-link interwiki-fi mw-list-item"><a href="https://fi.wikipedia.org/wiki/Kyberhy%C3%B6kk%C3%A4ys" title="Kyberhyökkäys – Finnish" lang="fi" hreflang="fi" data-title="Kyberhyökkäys" data-language-autonym="Suomi" data-language-local-name="Finnish" class="interlanguage-link-target"><span>Suomi</span></a></li><li class="interlanguage-link interwiki-ta mw-list-item"><a href="https://ta.wikipedia.org/wiki/%E0%AE%87%E0%AE%A3%E0%AF%88%E0%AE%AF%E0%AE%A4%E0%AF%8D_%E0%AE%A4%E0%AE%BE%E0%AE%95%E0%AF%8D%E0%AE%95%E0%AF%81%E0%AE%A4%E0%AE%B2%E0%AF%8D" title="இணையத் தாக்குதல் – Tamil" lang="ta" hreflang="ta" data-title="இணையத் தாக்குதல்" data-language-autonym="தமிழ்" data-language-local-name="Tamil" class="interlanguage-link-target"><span>தமிழ்</span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/Siber_sald%C4%B1r%C4%B1" title="Siber saldırı – Turkish" lang="tr" hreflang="tr" data-title="Siber saldırı" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/%D0%9A%D1%96%D0%B1%D0%B5%D1%80%D0%B0%D1%82%D0%B0%D0%BA%D0%B0" title="Кібератака – Ukrainian" lang="uk" hreflang="uk" data-title="Кібератака" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-vi mw-list-item"><a href="https://vi.wikipedia.org/wiki/T%E1%BA%A5n_c%C3%B4ng_m%E1%BA%A1ng" title="Tấn công mạng – Vietnamese" lang="vi" hreflang="vi" data-title="Tấn công mạng" data-language-autonym="Tiếng Việt" data-language-local-name="Vietnamese" class="interlanguage-link-target"><span>Tiếng Việt</span></a></li><li class="interlanguage-link interwiki-zh-yue mw-list-item"><a href="https://zh-yue.wikipedia.org/wiki/%E7%B6%B2%E7%B5%A1%E6%94%BB%E6%93%8A" title="網絡攻擊 – Cantonese" lang="yue" hreflang="yue" data-title="網絡攻擊" data-language-autonym="粵語" data-language-local-name="Cantonese" class="interlanguage-link-target"><span>粵語</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E7%BD%91%E7%BB%9C%E6%94%BB%E5%87%BB" title="网络攻击 – Chinese" lang="zh" hreflang="zh" data-title="网络攻击" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q4071928#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Cyberattack" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Cyberattack" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Cyberattack"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Cyberattack&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Cyberattack&action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Cyberattack"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Cyberattack&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Cyberattack&action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Cyberattack" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Cyberattack" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Cyberattack&oldid=1275153820" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Cyberattack&action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&page=Cyberattack&id=1275153820&wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FCyberattack"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FCyberattack"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&page=Cyberattack&action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Cyberattack&printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="wb-otherproject-link wb-otherproject-commons mw-list-item"><a href="https://commons.wikimedia.org/wiki/Category:Cyberattacks" hreflang="en"><span>Wikimedia Commons</span></a></li><li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q4071928" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Attack on a computer system</div> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">"Cyberstrike" redirects here. For the online game, see <a href="/wiki/CyberStrike" title="CyberStrike">CyberStrike</a>.</div> <p class="mw-empty-elt"> </p><p>A <b>cyberattack</b> (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the <a href="/wiki/CIA_triad" class="mw-redirect" title="CIA triad">confidentiality, integrity, or availability</a> of its content.<sup id="cite_ref-FOOTNOTELiLiu20218176–8186_1-0" class="reference"><a href="#cite_note-FOOTNOTELiLiu20218176–8186-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup> </p><p>The rising dependence on increasingly complex and interconnected computer systems in most domains of life is the main factor that causes vulnerability to cyberattacks, since virtually all computer systems have <a href="/wiki/Software_bug" title="Software bug">bugs</a> that can be <a href="/wiki/Exploit_(computer_security)" title="Exploit (computer security)">exploited</a> by attackers. Although it is impossible or impractical to create a perfectly secure system, there are many defense mechanisms that can make a system more difficult to attack, making <a href="/wiki/Information_security" title="Information security">information security</a> a field of rapidly increasing importance in the world today. </p><p>Perpetrators of a cyberattack can be criminals, <a href="/wiki/Hacktivist" class="mw-redirect" title="Hacktivist">hacktivists</a>, or states. They attempt to find weaknesses in a system, exploit them and create <a href="/wiki/Malware" title="Malware">malware</a> to carry out their goals, and deliver it to the targeted system. Once installed, the malware can have a variety of effects depending on its purpose. Detection of cyberattacks is often absent or delayed, especially when the malware attempts to spy on the system while remaining undiscovered. If it is discovered, the targeted organization may attempt to collect evidence about the attack, remove malware from its systems, and close the vulnerability that enabled the attack. </p><p>Cyberattacks can cause a variety of harms to targeted individuals, organizations, and governments, including significant financial losses and <a href="/wiki/Identity_theft" title="Identity theft">identity theft</a>. They are usually illegal both as a method of crime and <a href="/wiki/Cyberwarfare" title="Cyberwarfare">warfare</a>, although correctly attributing the attack is difficult and perpetrators are rarely prosecuted. </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="Definitions">Definitions</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=1" title="Edit section: Definitions"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>A cyberattack can be defined as any attempt by an individual or organization "using one or more computers and computer systems to steal, expose, change, disable or eliminate information, or to breach computer information systems, computer networks, and computer infrastructures".<sup id="cite_ref-FOOTNOTEAsbaşTuzlukaya2022303_2-0" class="reference"><a href="#cite_note-FOOTNOTEAsbaşTuzlukaya2022303-2"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup> Definitions differ as to the type of compromise required – for example, requiring the system to produce unexpected responses or cause injury or property damage.<sup id="cite_ref-FOOTNOTELiLiu20218179_3-0" class="reference"><a href="#cite_note-FOOTNOTELiLiu20218179-3"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup> Some definitions exclude attacks carried out by non-state actors and others require the target to be a state.<sup id="cite_ref-FOOTNOTELiLiu20218177–8179_4-0" class="reference"><a href="#cite_note-FOOTNOTELiLiu20218177–8179-4"><span class="cite-bracket">[</span>4<span class="cite-bracket">]</span></a></sup> Keeping a system secure relies on maintaining the <a href="/wiki/CIA_triad" class="mw-redirect" title="CIA triad">CIA triad</a>: confidentiality (no unauthorized access), integrity (no unauthorized modification), and availability.<sup id="cite_ref-FOOTNOTELiLiu20218183_5-0" class="reference"><a href="#cite_note-FOOTNOTELiLiu20218183-5"><span class="cite-bracket">[</span>5<span class="cite-bracket">]</span></a></sup> Although availability is less important for some web-based services, it can be the most crucial aspect for industrial systems.<sup id="cite_ref-FOOTNOTETjoa_''et_al.''202414_6-0" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''202414-6"><span class="cite-bracket">[</span>6<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Prevalence">Prevalence</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=2" title="Edit section: Prevalence"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In the first six months of 2017, two billion data records were stolen or impacted by cyber attacks, and <a href="/wiki/Ransomware" title="Ransomware">ransomware</a> payments reached <span style="white-space: nowrap">US$2 billion</span>, double that in 2016.<sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup> In 2020, with the increase of remote work as an effect of the COVID-19 global pandemic, cybersecurity statistics reveal a huge increase in hacked and breached data.<sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">[</span>8<span class="cite-bracket">]</span></a></sup> The worldwide information security market is forecast to reach $170.4 billion in 2022.<sup id="cite_ref-9" class="reference"><a href="#cite_note-9"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Vulnerability">Vulnerability</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=3" title="Edit section: Vulnerability"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Vulnerability_timeline.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/5/58/Vulnerability_timeline.png/260px-Vulnerability_timeline.png" decoding="async" width="260" height="142" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/5/58/Vulnerability_timeline.png/390px-Vulnerability_timeline.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/5/58/Vulnerability_timeline.png/520px-Vulnerability_timeline.png 2x" data-file-width="2558" data-file-height="1400" /></a><figcaption>Timeline of a software <a href="/wiki/Vulnerability_(computing)" class="mw-redirect" title="Vulnerability (computing)">vulnerability</a> that is discovered by attackers prior to a vendor (<a href="/wiki/Zero-day_(computing)" class="mw-redirect" title="Zero-day (computing)">zero day</a>) </figcaption></figure> <p>Over time, computer systems make up an increasing portion of daily life and interactions. While the increasing complexity and connectedness of the systems increases the efficiency, power, and convenience of computer technology, it also renders the systems more vulnerable to attack and worsens the consequences of an attack, should one occur.<sup id="cite_ref-FOOTNOTELinkovKott20191_10-0" class="reference"><a href="#cite_note-FOOTNOTELinkovKott20191-10"><span class="cite-bracket">[</span>10<span class="cite-bracket">]</span></a></sup> </p><p>Despite developers' goal of delivering a product that works entirely as intended, virtually all <a href="/wiki/Software_bugs" class="mw-redirect" title="Software bugs">software</a> and <a href="/wiki/Hardware_bug" title="Hardware bug">hardware</a> contains bugs.<sup id="cite_ref-FOOTNOTEAblonBogart20171_11-0" class="reference"><a href="#cite_note-FOOTNOTEAblonBogart20171-11"><span class="cite-bracket">[</span>11<span class="cite-bracket">]</span></a></sup> If a bug creates a security risk, it is called a <a href="/wiki/Vulnerability_(computing)" class="mw-redirect" title="Vulnerability (computing)">vulnerability</a>.<sup id="cite_ref-FOOTNOTEAblonBogart20172_12-0" class="reference"><a href="#cite_note-FOOTNOTEAblonBogart20172-12"><span class="cite-bracket">[</span>12<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-FOOTNOTEDaswaniElbayadi202125_13-0" class="reference"><a href="#cite_note-FOOTNOTEDaswaniElbayadi202125-13"><span class="cite-bracket">[</span>13<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-FOOTNOTESeaman202047–48_14-0" class="reference"><a href="#cite_note-FOOTNOTESeaman202047–48-14"><span class="cite-bracket">[</span>14<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Software_patch" class="mw-redirect" title="Software patch">Patches</a> are often released to fix identified vulnerabilities, but those that remain unknown (<a href="/wiki/Zero-day_(computing)" class="mw-redirect" title="Zero-day (computing)">zero days</a>) as well as those that have not been patched are still liable for exploitation.<sup id="cite_ref-FOOTNOTEDaswaniElbayadi202126–27_15-0" class="reference"><a href="#cite_note-FOOTNOTEDaswaniElbayadi202126–27-15"><span class="cite-bracket">[</span>15<span class="cite-bracket">]</span></a></sup> The software vendor is not legally liable for the cost if a vulnerability is used in an attack, which creates an incentive to make cheaper but less secure software.<sup id="cite_ref-FOOTNOTESloanWarner2019104–105_16-0" class="reference"><a href="#cite_note-FOOTNOTESloanWarner2019104–105-16"><span class="cite-bracket">[</span>16<span class="cite-bracket">]</span></a></sup> Vulnerabilities vary in their ability to be <a href="/wiki/Exploit_(computer_security)" title="Exploit (computer security)">exploited</a> by malicious actors. The most valuable allow the attacker to <a href="/wiki/Code_injection" title="Code injection">inject</a> and run their own code (called <a href="/wiki/Malware" title="Malware">malware</a>), without the user being aware of it.<sup id="cite_ref-FOOTNOTEAblonBogart20172_12-1" class="reference"><a href="#cite_note-FOOTNOTEAblonBogart20172-12"><span class="cite-bracket">[</span>12<span class="cite-bracket">]</span></a></sup> Without a vulnerability enabling access, the attacker cannot gain access to the system.<sup id="cite_ref-FOOTNOTEHaberHibbert201810_17-0" class="reference"><a href="#cite_note-FOOTNOTEHaberHibbert201810-17"><span class="cite-bracket">[</span>17<span class="cite-bracket">]</span></a></sup> </p><p>The Vulnerability Model (VM) identifies attack patterns, threats, and valuable assets, which can be physical or intangible. It addresses security concerns like confidentiality, integrity, availability, and accountability within business, application, or infrastructure contexts.<sup id="cite_ref-18" class="reference"><a href="#cite_note-18"><span class="cite-bracket">[</span>18<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Protection">Protection</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=4" title="Edit section: Protection"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Further information: <a href="/wiki/Cybersecurity" class="mw-redirect" title="Cybersecurity">Cybersecurity</a> and <a href="/wiki/Cyber_resilience" title="Cyber resilience">cyber resilience</a></div> <p>A system's architecture and design decisions play a major role in determining how safe it can be.<sup id="cite_ref-FOOTNOTETjoa_''et_al.''202465_19-0" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''202465-19"><span class="cite-bracket">[</span>19<span class="cite-bracket">]</span></a></sup> The traditional approach to improving security is the detection of systems vulnerable to attack and <a href="/wiki/Hardening_(computing)" title="Hardening (computing)">hardening</a> these systems to make attacks more difficult, but it is only partially effective.<sup id="cite_ref-FOOTNOTELinkovKott20192,_7_20-0" class="reference"><a href="#cite_note-FOOTNOTELinkovKott20192,_7-20"><span class="cite-bracket">[</span>20<span class="cite-bracket">]</span></a></sup> Formal <a href="/wiki/Risk_assessment" title="Risk assessment">risk assessment</a> for compromise of highly complex and interconnected systems is impractical<sup id="cite_ref-FOOTNOTELinkovKott20192_21-0" class="reference"><a href="#cite_note-FOOTNOTELinkovKott20192-21"><span class="cite-bracket">[</span>21<span class="cite-bracket">]</span></a></sup> and the related question of how much to spend on security is difficult to answer.<sup id="cite_ref-FOOTNOTETjoa_''_et_al.''20243_22-0" class="reference"><a href="#cite_note-FOOTNOTETjoa_''_et_al.''20243-22"><span class="cite-bracket">[</span>22<span class="cite-bracket">]</span></a></sup> Because of the ever changing and uncertain nature of cyber-threats, risk assessment may produce scenarios that are costly or unaffordable to mitigate.<sup id="cite_ref-FOOTNOTELinkovKott20197_23-0" class="reference"><a href="#cite_note-FOOTNOTELinkovKott20197-23"><span class="cite-bracket">[</span>23<span class="cite-bracket">]</span></a></sup> As of 2019<sup class="plainlinks noexcerpt noprint asof-tag update" style="display:none;"><a class="external text" href="https://en.wikipedia.org/w/index.php?title=Cyberattack&action=edit">[update]</a></sup>, there are no commercially available, widely used <a href="/wiki/Active_defense" title="Active defense">active defense</a> systems for protecting systems by intentionally increasing the complexity or variability of systems to make it harder to attack.<sup id="cite_ref-FOOTNOTELinkovKott201919–20_24-0" class="reference"><a href="#cite_note-FOOTNOTELinkovKott201919–20-24"><span class="cite-bracket">[</span>24<span class="cite-bracket">]</span></a></sup> The <a href="/wiki/Cyber_resilience" title="Cyber resilience">cyber resilience</a> approach, on the other hand, assumes that breaches will occur and focuses on protecting essential functionality even if parts are compromised, using approaches such as <a href="/wiki/Micro-segmentation" class="mw-redirect" title="Micro-segmentation">micro-segmentation</a>, <a href="/wiki/Zero_trust" class="mw-redirect" title="Zero trust">zero trust</a>, and <a href="/wiki/Business_continuity_planning" title="Business continuity planning">business continuity planning</a>.<sup id="cite_ref-FOOTNOTETjoa_''et_al.''202415_25-0" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''202415-25"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup> </p><p>The majority of attacks can be prevented by ensuring all software is fully patched. Nevertheless, fully patched systems are still vulnerable to exploits using <a href="/wiki/Zero-day_vulnerability" title="Zero-day vulnerability">zero-day vulnerabilities</a>.<sup id="cite_ref-FOOTNOTEAblonBogart20173_26-0" class="reference"><a href="#cite_note-FOOTNOTEAblonBogart20173-26"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup> The highest risk of attack occurs just after a vulnerability has been publicly disclosed or a patch is released, because attackers can create exploits faster than a patch can be developed and rolled out.<sup id="cite_ref-FOOTNOTELibickiAblonWebb201549–50_27-0" class="reference"><a href="#cite_note-FOOTNOTELibickiAblonWebb201549–50-27"><span class="cite-bracket">[</span>27<span class="cite-bracket">]</span></a></sup> </p><p>Software solutions aim to prevent unauthorized access and detect the intrusion of malicious software.<sup id="cite_ref-FOOTNOTEAgrafiotis_''et_al.''20182_28-0" class="reference"><a href="#cite_note-FOOTNOTEAgrafiotis_''et_al.''20182-28"><span class="cite-bracket">[</span>28<span class="cite-bracket">]</span></a></sup> Training users can avoid cyberattacks (for example, not to click on a suspicious link or email attachment), especially those that depend on user error.<sup id="cite_ref-FOOTNOTELiLiu20218183_5-1" class="reference"><a href="#cite_note-FOOTNOTELiLiu20218183-5"><span class="cite-bracket">[</span>5<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-FOOTNOTELinkovKott201920_29-0" class="reference"><a href="#cite_note-FOOTNOTELinkovKott201920-29"><span class="cite-bracket">[</span>29<span class="cite-bracket">]</span></a></sup> However, too many rules can cause employees to disregard them, negating any security improvement. Some insider attacks can also be prevented using rules and procedures.<sup id="cite_ref-FOOTNOTELinkovKott201920_29-1" class="reference"><a href="#cite_note-FOOTNOTELinkovKott201920-29"><span class="cite-bracket">[</span>29<span class="cite-bracket">]</span></a></sup> Technical solutions can prevent many causes of human error that leave data vulnerable to attackers, such as encrypting all sensitive data, preventing employees from using insecure passwords, installing <a href="/wiki/Antivirus_software" title="Antivirus software">antivirus software</a> to prevent malware, and implementing a robust patching system to ensure that all devices are kept up to date.<sup id="cite_ref-FOOTNOTEDaswaniElbayadi202131–32_30-0" class="reference"><a href="#cite_note-FOOTNOTEDaswaniElbayadi202131–32-30"><span class="cite-bracket">[</span>30<span class="cite-bracket">]</span></a></sup> </p><p>There is little evidence about the effectiveness and cost-effectiveness of different cyberattack prevention measures.<sup id="cite_ref-FOOTNOTEAgrafiotis_''et_al.''20182_28-1" class="reference"><a href="#cite_note-FOOTNOTEAgrafiotis_''et_al.''20182-28"><span class="cite-bracket">[</span>28<span class="cite-bracket">]</span></a></sup> Although attention to security can reduce the risk of attack, achieving perfect security for a complex system is impossible, and many security measures have unacceptable cost or usability downsides.<sup id="cite_ref-FOOTNOTETjoa_''et_al.''202463_31-0" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''202463-31"><span class="cite-bracket">[</span>31<span class="cite-bracket">]</span></a></sup> For example, reducing the complexity and functionality of the system is effective at reducing the <a href="/wiki/Attack_surface" title="Attack surface">attack surface</a>.<sup id="cite_ref-FOOTNOTETjoa_''et_al.''202468,_70_32-0" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''202468,_70-32"><span class="cite-bracket">[</span>32<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Air_gap_(networking)" title="Air gap (networking)">Disconnecting systems from the internet</a> is one truly effective measure against attacks, but it is rarely feasible.<sup id="cite_ref-FOOTNOTELinkovKott20192_21-1" class="reference"><a href="#cite_note-FOOTNOTELinkovKott20192-21"><span class="cite-bracket">[</span>21<span class="cite-bracket">]</span></a></sup> In some jurisdictions, there are legal requirements for protecting against attacks.<sup id="cite_ref-FOOTNOTETjoa_''_et_al.''20244–5_33-0" class="reference"><a href="#cite_note-FOOTNOTETjoa_''_et_al.''20244–5-33"><span class="cite-bracket">[</span>33<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Attack_process_and_types">Attack process and types</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=5" title="Edit section: Attack process and types"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Computer_security#Vulnerabilities_and_attacks" title="Computer security">Computer security § Vulnerabilities and attacks</a></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Intrusion_Kill_Chain_-_v2.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/1/1d/Intrusion_Kill_Chain_-_v2.png/260px-Intrusion_Kill_Chain_-_v2.png" decoding="async" width="260" height="186" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/1/1d/Intrusion_Kill_Chain_-_v2.png/390px-Intrusion_Kill_Chain_-_v2.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/1/1d/Intrusion_Kill_Chain_-_v2.png/520px-Intrusion_Kill_Chain_-_v2.png 2x" data-file-width="950" data-file-height="681" /></a><figcaption>Intrusion <a href="/wiki/Cyber_kill_chain" title="Cyber kill chain">kill chain</a> for information security</figcaption></figure> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Cyberattack_chain.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/a/a5/Cyberattack_chain.jpg/260px-Cyberattack_chain.jpg" decoding="async" width="260" height="130" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/a/a5/Cyberattack_chain.jpg/390px-Cyberattack_chain.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/a/a5/Cyberattack_chain.jpg/520px-Cyberattack_chain.jpg 2x" data-file-width="2160" data-file-height="1080" /></a><figcaption>Another model of the cyberattack chain</figcaption></figure> <p>The <a href="/wiki/Cyber_kill_chain" title="Cyber kill chain">cyber kill chain</a> is the process by which perpetrators carry out cyberattacks.<sup id="cite_ref-FOOTNOTESkopikPahi20204_34-0" class="reference"><a href="#cite_note-FOOTNOTESkopikPahi20204-34"><span class="cite-bracket">[</span>34<span class="cite-bracket">]</span></a></sup> </p> <ol><li>Reconnaissance: would-be attackers search for information about the system in order to target it. They may seek out <a href="/wiki/Open_source_intelligence" class="mw-redirect" title="Open source intelligence">publicly available information</a> or carry out <a href="/wiki/Social_engineering_attack" class="mw-redirect" title="Social engineering attack">social engineering attacks</a> to obtain more information about the target's systems.<sup id="cite_ref-FOOTNOTESkopikPahi20204_34-1" class="reference"><a href="#cite_note-FOOTNOTESkopikPahi20204-34"><span class="cite-bracket">[</span>34<span class="cite-bracket">]</span></a></sup></li> <li>Weaponization: after finding a <a href="/wiki/Vulnerability_(computing)" class="mw-redirect" title="Vulnerability (computing)">vulnerability</a>, attackers build an <a href="/wiki/Exploit_(computer_security)" title="Exploit (computer security)">exploit</a> to gain access, and <a href="/wiki/Malware" title="Malware">malware</a> to carry out the attack.<sup id="cite_ref-FOOTNOTESkopikPahi20205_35-0" class="reference"><a href="#cite_note-FOOTNOTESkopikPahi20205-35"><span class="cite-bracket">[</span>35<span class="cite-bracket">]</span></a></sup></li> <li>Delivery: once complete, the malware is delivered to the target.<sup id="cite_ref-FOOTNOTESkopikPahi20205_35-1" class="reference"><a href="#cite_note-FOOTNOTESkopikPahi20205-35"><span class="cite-bracket">[</span>35<span class="cite-bracket">]</span></a></sup> Most data breaches and malware insertions are enabled by <a href="/wiki/Phishing" title="Phishing">phishing</a>, where the attacker sends a malicious communication, often an email, in an attempt to get the recipient to click on a link or attachment to deliver malware.<sup id="cite_ref-FOOTNOTEAl-TurjmanSalama2020242_36-0" class="reference"><a href="#cite_note-FOOTNOTEAl-TurjmanSalama2020242-36"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Drive-by-download" class="mw-redirect" title="Drive-by-download">Drive-by-download</a> does not require any clicks, only a visit to a malicious website.<sup id="cite_ref-FOOTNOTEAl-TurjmanSalama2020242_36-1" class="reference"><a href="#cite_note-FOOTNOTEAl-TurjmanSalama2020242-36"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup> Sometimes insiders are behind the attack and can use their credentials to bypass security.<sup id="cite_ref-FOOTNOTEAl-TurjmanSalama2020243–244_37-0" class="reference"><a href="#cite_note-FOOTNOTEAl-TurjmanSalama2020243–244-37"><span class="cite-bracket">[</span>37<span class="cite-bracket">]</span></a></sup> Some attacks are delivered indirectly via associated companies that have a business relationship with the target. Others may be delivered by directly accessing hardware, particularly in the cases of bribery or <a href="/wiki/Blackmail" title="Blackmail">blackmail</a>.<sup id="cite_ref-FOOTNOTESkopikPahi20205_35-2" class="reference"><a href="#cite_note-FOOTNOTESkopikPahi20205-35"><span class="cite-bracket">[</span>35<span class="cite-bracket">]</span></a></sup></li> <li>Exploitation: the attacker's software is executed on the targeted system, and often creates a <a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">backdoor</a> to enable remote control by the attacker.<sup id="cite_ref-FOOTNOTESkopikPahi20205_35-3" class="reference"><a href="#cite_note-FOOTNOTESkopikPahi20205-35"><span class="cite-bracket">[</span>35<span class="cite-bracket">]</span></a></sup></li> <li>Many attackers will not launch an attack right away.<sup id="cite_ref-FOOTNOTETjoa_et_al.20243_38-0" class="reference"><a href="#cite_note-FOOTNOTETjoa_et_al.20243-38"><span class="cite-bracket">[</span>38<span class="cite-bracket">]</span></a></sup> The attacker often seeks to persist after system interruption (such as <a href="/wiki/Crash_(computing)" title="Crash (computing)">crash</a> or restart), evade detection, and <a href="/wiki/Privilege_escalation" title="Privilege escalation">escalate privileges</a>,<sup id="cite_ref-FOOTNOTESkopikPahi20206_39-0" class="reference"><a href="#cite_note-FOOTNOTESkopikPahi20206-39"><span class="cite-bracket">[</span>39<span class="cite-bracket">]</span></a></sup> and secure multiple channels of communication with its controllers.<sup id="cite_ref-FOOTNOTETjoa_et_al.20243_38-1" class="reference"><a href="#cite_note-FOOTNOTETjoa_et_al.20243-38"><span class="cite-bracket">[</span>38<span class="cite-bracket">]</span></a></sup> Other common actions include responding to remote controls and collecting and copying data to a device controlled by the attacker (<a href="/wiki/Data_exfiltration" title="Data exfiltration">data exfiltration</a>).<sup id="cite_ref-FOOTNOTESkopikPahi20206_39-1" class="reference"><a href="#cite_note-FOOTNOTESkopikPahi20206-39"><span class="cite-bracket">[</span>39<span class="cite-bracket">]</span></a></sup></li></ol> <div class="mw-heading mw-heading3"><h3 id="Activity">Activity</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=6" title="Edit section: Activity"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>After the malware is installed, its activity varies greatly depending on the attacker's goals.<sup id="cite_ref-FOOTNOTESkopikPahi20205–6_40-0" class="reference"><a href="#cite_note-FOOTNOTESkopikPahi20205–6-40"><span class="cite-bracket">[</span>40<span class="cite-bracket">]</span></a></sup> Many attackers try to eavesdrop on a system without affecting it. Although this type of malware can have unexpected <a href="/wiki/Side_effects" class="mw-redirect" title="Side effects">side effects</a>, it is often very difficult to detect.<sup id="cite_ref-FOOTNOTETjoa_''et_al.''202417_41-0" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''202417-41"><span class="cite-bracket">[</span>41<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Botnet" title="Botnet">Botnets</a> are networks of compromised devices that can be used to send <a href="/wiki/Spamming" title="Spamming">spam</a> or carry out<sup id="cite_ref-FOOTNOTEAl-TurjmanSalama2020243_42-0" class="reference"><a href="#cite_note-FOOTNOTEAl-TurjmanSalama2020243-42"><span class="cite-bracket">[</span>42<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Denial-of-service" class="mw-redirect" title="Denial-of-service">denial-of-service</a> attacks—flooding a system with too many requests for the system to handle at once, causing it to become unusable.<sup id="cite_ref-FOOTNOTEAl-TurjmanSalama2020242_36-2" class="reference"><a href="#cite_note-FOOTNOTEAl-TurjmanSalama2020242-36"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup> Attackers may also use computers to mine <a href="/wiki/Cryptocurrencies" class="mw-redirect" title="Cryptocurrencies">cryptocurrencies</a>, such as <a href="/wiki/Bitcoin" title="Bitcoin">Bitcoin</a>, for their own profit.<sup id="cite_ref-FOOTNOTEAl-TurjmanSalama2020244_43-0" class="reference"><a href="#cite_note-FOOTNOTEAl-TurjmanSalama2020244-43"><span class="cite-bracket">[</span>43<span class="cite-bracket">]</span></a></sup> </p><p><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a> is software used to encrypt or destroy data; attackers demand payment for the restoration of the targeted system. The advent of <a href="/wiki/Cryptocurrency" title="Cryptocurrency">cryptocurrency</a> enabling anonymous transactions has led to a dramatic increase in ransomware demands.<sup id="cite_ref-FOOTNOTEHyslip2020828_44-0" class="reference"><a href="#cite_note-FOOTNOTEHyslip2020828-44"><span class="cite-bracket">[</span>44<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Perpetrators_and_motivations">Perpetrators and motivations</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=7" title="Edit section: Perpetrators and motivations"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Deface_page_of_Sparked.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/9/9d/Deface_page_of_Sparked.jpg/260px-Deface_page_of_Sparked.jpg" decoding="async" width="260" height="129" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/9/9d/Deface_page_of_Sparked.jpg/390px-Deface_page_of_Sparked.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/9/9d/Deface_page_of_Sparked.jpg/520px-Deface_page_of_Sparked.jpg 2x" data-file-width="1366" data-file-height="676" /></a><figcaption><a href="/wiki/Website_defacement" title="Website defacement">Website defacement</a>: <a href="/wiki/Lapsus$" title="Lapsus$">Lapsus$</a> hackers replaced the content of a website</figcaption></figure> <p>The stereotype of a hacker is an individual working for themself. However, many cyber threats are teams of well-resourced experts.<sup id="cite_ref-FOOTNOTETjoa_''et_al.''20243_45-0" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''20243-45"><span class="cite-bracket">[</span>45<span class="cite-bracket">]</span></a></sup> "Growing revenues for cyber criminals are leading to more and more attacks, increasing professionalism and highly specialized attackers. In addition, unlike other forms of crime, cybercrime can be carried out remotely, and cyber attacks often scale well."<sup id="cite_ref-FOOTNOTETjoa_''et_al.''20249_46-0" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''20249-46"><span class="cite-bracket">[</span>46<span class="cite-bracket">]</span></a></sup> Many cyberattacks are caused or enabled by insiders, often employees who bypass security procedures to get their job done more efficiently.<sup id="cite_ref-FOOTNOTETjoa_''et_al.''202416_47-0" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''202416-47"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup> Attackers vary widely in their skill and sophistication and well as their determination to attack a particular target, as opposed to opportunistically picking one easy to attack.<sup id="cite_ref-FOOTNOTETjoa_''et_al.''202416_47-1" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''202416-47"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup> The skill level of the attacker determined which types of attacks they are prepared to mount.<sup id="cite_ref-FOOTNOTETjoa_''et_al.''202416–17_48-0" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''202416–17-48"><span class="cite-bracket">[</span>48<span class="cite-bracket">]</span></a></sup> The <a href="/wiki/Advanced_persistent_threats" class="mw-redirect" title="Advanced persistent threats">most sophisticated attackers</a> can persist undetected on a hardened system for an extended period of time.<sup id="cite_ref-FOOTNOTETjoa_''et_al.''202416_47-2" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''202416-47"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup> </p><p>Motivations and aims also differ. Depending whether the expected threat is passive espionage, data manipulation, or active hijacking, different mitigation methods may be needed.<sup id="cite_ref-FOOTNOTETjoa_''et_al.''202417_41-1" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''202417-41"><span class="cite-bracket">[</span>41<span class="cite-bracket">]</span></a></sup> </p><p>Software vendors and governments are mainly interested in undisclosed vulnerabilities (<a href="/wiki/Zero-days" class="mw-redirect" title="Zero-days">zero-days</a>),<sup id="cite_ref-FOOTNOTELibickiAblonWebb201544–45_49-0" class="reference"><a href="#cite_note-FOOTNOTELibickiAblonWebb201544–45-49"><span class="cite-bracket">[</span>49<span class="cite-bracket">]</span></a></sup> while organized crime groups are more interested in ready-to-use <a href="/wiki/Exploit_kit" title="Exploit kit">exploit kits</a> based on known vulnerabilities,<sup id="cite_ref-FOOTNOTELibickiAblonWebb201544,_46_50-0" class="reference"><a href="#cite_note-FOOTNOTELibickiAblonWebb201544,_46-50"><span class="cite-bracket">[</span>50<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-FOOTNOTEHyslip2020831_51-0" class="reference"><a href="#cite_note-FOOTNOTEHyslip2020831-51"><span class="cite-bracket">[</span>51<span class="cite-bracket">]</span></a></sup> which are much cheaper.<sup id="cite_ref-FOOTNOTEPerlroth202142_52-0" class="reference"><a href="#cite_note-FOOTNOTEPerlroth202142-52"><span class="cite-bracket">[</span>52<span class="cite-bracket">]</span></a></sup> The lack of transparency in the market causes problems, such as buyers being unable to guarantee that the zero-day vulnerability was not sold to another party.<sup id="cite_ref-FOOTNOTEPerlroth202158_53-0" class="reference"><a href="#cite_note-FOOTNOTEPerlroth202158-53"><span class="cite-bracket">[</span>53<span class="cite-bracket">]</span></a></sup> Both buyers and sellers advertise on the <a href="/wiki/Dark_web" title="Dark web">dark web</a> and use <a href="/wiki/Cryptocurrency" title="Cryptocurrency">cryptocurrency</a> for untraceable transactions.<sup id="cite_ref-FOOTNOTESoodEnbody2014117_54-0" class="reference"><a href="#cite_note-FOOTNOTESoodEnbody2014117-54"><span class="cite-bracket">[</span>54<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-FOOTNOTEHyslip2020816_55-0" class="reference"><a href="#cite_note-FOOTNOTEHyslip2020816-55"><span class="cite-bracket">[</span>55<span class="cite-bracket">]</span></a></sup> Because of the difficulty in writing and maintaining software that can attack a wide variety of systems, criminals found they could make more money by renting out their exploits rather than using them directly.<sup id="cite_ref-FOOTNOTEHyslip2020831–832_56-0" class="reference"><a href="#cite_note-FOOTNOTEHyslip2020831–832-56"><span class="cite-bracket">[</span>56<span class="cite-bracket">]</span></a></sup> </p><p><a href="/w/index.php?title=Cybercrime_as_a_service&action=edit&redlink=1" class="new" title="Cybercrime as a service (page does not exist)">Cybercrime as a service</a>, where hackers sell prepacked software that can be used to cause a cyberattack, is increasingly popular as a lower risk and higher profit activity than traditional hacking.<sup id="cite_ref-FOOTNOTEHyslip2020816_55-1" class="reference"><a href="#cite_note-FOOTNOTEHyslip2020816-55"><span class="cite-bracket">[</span>55<span class="cite-bracket">]</span></a></sup> A major form of this is to create a botnet of compromised devices and rent or sell it to another cybercriminal. Different botnets are equipped for different tasks such as DDOS attacks or password cracking.<sup id="cite_ref-FOOTNOTEHyslip2020818_57-0" class="reference"><a href="#cite_note-FOOTNOTEHyslip2020818-57"><span class="cite-bracket">[</span>57<span class="cite-bracket">]</span></a></sup> It is also possible to buy the software used to create a botnet<sup id="cite_ref-FOOTNOTEHyslip2020820_58-0" class="reference"><a href="#cite_note-FOOTNOTEHyslip2020820-58"><span class="cite-bracket">[</span>58<span class="cite-bracket">]</span></a></sup> and <a href="/wiki/Internet_bot" title="Internet bot">bots</a> that load the purchaser's malware onto a botnet's devices.<sup id="cite_ref-FOOTNOTEHyslip2020821_59-0" class="reference"><a href="#cite_note-FOOTNOTEHyslip2020821-59"><span class="cite-bracket">[</span>59<span class="cite-bracket">]</span></a></sup> DDOS as a service using botnets retained under the control of the seller is also common, and may be the first cybercrime as a service product, and can also be committed by <a href="/wiki/SMS_flooding" class="mw-redirect" title="SMS flooding">SMS flooding</a> on the cellular network.<sup id="cite_ref-FOOTNOTEHyslip2020822–823_60-0" class="reference"><a href="#cite_note-FOOTNOTEHyslip2020822–823-60"><span class="cite-bracket">[</span>60<span class="cite-bracket">]</span></a></sup> Malware and ransomware as a service have made it possible for individuals without technical ability to carry out cyberattacks.<sup id="cite_ref-FOOTNOTEHyslip2020828-829_61-0" class="reference"><a href="#cite_note-FOOTNOTEHyslip2020828-829-61"><span class="cite-bracket">[</span>61<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Targets_and_consequences">Targets and consequences</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=8" title="Edit section: Targets and consequences"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Top_ten_industries_targeted_by_cyberattacks_in_the_United_States_in_2020.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/5/55/Top_ten_industries_targeted_by_cyberattacks_in_the_United_States_in_2020.png/220px-Top_ten_industries_targeted_by_cyberattacks_in_the_United_States_in_2020.png" decoding="async" width="220" height="93" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/5/55/Top_ten_industries_targeted_by_cyberattacks_in_the_United_States_in_2020.png/330px-Top_ten_industries_targeted_by_cyberattacks_in_the_United_States_in_2020.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/5/55/Top_ten_industries_targeted_by_cyberattacks_in_the_United_States_in_2020.png/440px-Top_ten_industries_targeted_by_cyberattacks_in_the_United_States_in_2020.png 2x" data-file-width="1867" data-file-height="787" /></a><figcaption>Top ten industries targeted by cyberattacks in the United States in 2020</figcaption></figure> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Total_annualized_cyber_attack_cost_by_attack_type,_2016%E2%80%932017.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/4/48/Total_annualized_cyber_attack_cost_by_attack_type%2C_2016%E2%80%932017.png/220px-Total_annualized_cyber_attack_cost_by_attack_type%2C_2016%E2%80%932017.png" decoding="async" width="220" height="99" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/4/48/Total_annualized_cyber_attack_cost_by_attack_type%2C_2016%E2%80%932017.png/330px-Total_annualized_cyber_attack_cost_by_attack_type%2C_2016%E2%80%932017.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/4/48/Total_annualized_cyber_attack_cost_by_attack_type%2C_2016%E2%80%932017.png/440px-Total_annualized_cyber_attack_cost_by_attack_type%2C_2016%E2%80%932017.png 2x" data-file-width="485" data-file-height="219" /></a><figcaption>Total annualized cyberattack cost by attack type, 2016–2017</figcaption></figure> <p>Targets of cyberattacks range from individuals to corporations and government entities.<sup id="cite_ref-FOOTNOTELinkovKott20191_10-1" class="reference"><a href="#cite_note-FOOTNOTELinkovKott20191-10"><span class="cite-bracket">[</span>10<span class="cite-bracket">]</span></a></sup> Many cyberattacks are foiled or unsuccessful, but those that succeed can have devastating consequences.<sup id="cite_ref-FOOTNOTELinkovKott20192_21-2" class="reference"><a href="#cite_note-FOOTNOTELinkovKott20192-21"><span class="cite-bracket">[</span>21<span class="cite-bracket">]</span></a></sup> Understanding the negative effects of cyberattacks helps organizations ensure that their prevention strategies are cost-effective.<sup id="cite_ref-FOOTNOTEAgrafiotis_''et_al.''20182_28-2" class="reference"><a href="#cite_note-FOOTNOTEAgrafiotis_''et_al.''20182-28"><span class="cite-bracket">[</span>28<span class="cite-bracket">]</span></a></sup> One paper classifies the harm caused by cyberattacks in several domains:<sup id="cite_ref-FOOTNOTEAgrafiotis_''et_al.''20187_62-0" class="reference"><a href="#cite_note-FOOTNOTEAgrafiotis_''et_al.''20187-62"><span class="cite-bracket">[</span>62<span class="cite-bracket">]</span></a></sup> </p> <ul><li>Physical damage, including injury or death or destruction of property<sup id="cite_ref-FOOTNOTEAgrafiotis_''et_al.''20189_63-0" class="reference"><a href="#cite_note-FOOTNOTEAgrafiotis_''et_al.''20189-63"><span class="cite-bracket">[</span>63<span class="cite-bracket">]</span></a></sup></li> <li>Digital damage, such as the destruction of data or introduction of malware<sup id="cite_ref-FOOTNOTEAgrafiotis_''et_al.''20189_63-1" class="reference"><a href="#cite_note-FOOTNOTEAgrafiotis_''et_al.''20189-63"><span class="cite-bracket">[</span>63<span class="cite-bracket">]</span></a></sup></li> <li>Economic losses, such as those caused by disrupted operations, the cost of investigation, or regulatory fines.<sup id="cite_ref-FOOTNOTEAgrafiotis_''et_al.''20189_63-2" class="reference"><a href="#cite_note-FOOTNOTEAgrafiotis_''et_al.''20189-63"><span class="cite-bracket">[</span>63<span class="cite-bracket">]</span></a></sup></li> <li><a href="/wiki/Psychological_trauma" title="Psychological trauma">Psychological harm</a>, such as users being upset that their data has been leaked<sup id="cite_ref-FOOTNOTEAgrafiotis_''et_al.''201810,_12_64-0" class="reference"><a href="#cite_note-FOOTNOTEAgrafiotis_''et_al.''201810,_12-64"><span class="cite-bracket">[</span>64<span class="cite-bracket">]</span></a></sup></li> <li><a href="/wiki/Reputational_damage" title="Reputational damage">Reputational damage</a>, loss of reputation caused by the attack<sup id="cite_ref-FOOTNOTEAgrafiotis_''et_al.''201810_65-0" class="reference"><a href="#cite_note-FOOTNOTEAgrafiotis_''et_al.''201810-65"><span class="cite-bracket">[</span>65<span class="cite-bracket">]</span></a></sup></li> <li>Negative <a href="/wiki/Externalities" class="mw-redirect" title="Externalities">externalities</a> to society at large, such as consumers losing access to an important service because of the attack.<sup id="cite_ref-FOOTNOTEAgrafiotis_''et_al.''20187,_10_66-0" class="reference"><a href="#cite_note-FOOTNOTEAgrafiotis_''et_al.''20187,_10-66"><span class="cite-bracket">[</span>66<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="Consumer_data">Consumer data</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=9" title="Edit section: Consumer data"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Data_breach" title="Data breach">Data breach</a></div> <p>Thousands of <a href="/wiki/Data_record" class="mw-redirect" title="Data record">data records</a> are stolen from individuals every day.<sup id="cite_ref-FOOTNOTELinkovKott20191_10-2" class="reference"><a href="#cite_note-FOOTNOTELinkovKott20191-10"><span class="cite-bracket">[</span>10<span class="cite-bracket">]</span></a></sup> According to a 2020 estimate, 55 percent of data breaches were caused by <a href="/wiki/Organized_crime" title="Organized crime">organized crime</a>, 10 percent by <a href="/wiki/System_administrators" class="mw-redirect" title="System administrators">system administrators</a>, 10 percent by <a href="/wiki/End_user" title="End user">end users</a> such as customers or employees, and 10 percent by states or state-affiliated actors.<sup id="cite_ref-FOOTNOTECrawley202146_67-0" class="reference"><a href="#cite_note-FOOTNOTECrawley202146-67"><span class="cite-bracket">[</span>67<span class="cite-bracket">]</span></a></sup> Opportunistic criminals may cause data breaches—often using <a href="/wiki/Malware" title="Malware">malware</a> or <a href="/wiki/Social_engineering_attack" class="mw-redirect" title="Social engineering attack">social engineering attacks</a>, but they will typically move on if the security is above average. More organized criminals have more resources and are more focused in their <a href="/wiki/Targeted_threat" title="Targeted threat">targeting of particular data</a>.<sup id="cite_ref-FOOTNOTEFowler20167–8_68-0" class="reference"><a href="#cite_note-FOOTNOTEFowler20167–8-68"><span class="cite-bracket">[</span>68<span class="cite-bracket">]</span></a></sup> Both of them sell the information they obtain for financial gain.<sup id="cite_ref-FOOTNOTEFowler201613_69-0" class="reference"><a href="#cite_note-FOOTNOTEFowler201613-69"><span class="cite-bracket">[</span>69<span class="cite-bracket">]</span></a></sup> Another source of data breaches are <a href="/wiki/Hacktivism" title="Hacktivism">politically motivated hackers</a>, for example <a href="/wiki/Anonymous_(hacker_group)" title="Anonymous (hacker group)">Anonymous</a>, that target particular objectives.<sup id="cite_ref-FOOTNOTEFowler20169–10_70-0" class="reference"><a href="#cite_note-FOOTNOTEFowler20169–10-70"><span class="cite-bracket">[</span>70<span class="cite-bracket">]</span></a></sup> State-sponsored hackers target either citizens of their country or foreign entities, for such purposes as <a href="/wiki/Political_repression" title="Political repression">political repression</a> and <a href="/wiki/Espionage" title="Espionage">espionage</a>.<sup id="cite_ref-FOOTNOTEFowler201610–11_71-0" class="reference"><a href="#cite_note-FOOTNOTEFowler201610–11-71"><span class="cite-bracket">[</span>71<span class="cite-bracket">]</span></a></sup> </p><p>After a data breach, criminals make money by selling data, such as usernames, passwords, <a href="/wiki/Social_media" title="Social media">social media</a> or <a href="/wiki/Customer_loyalty" class="mw-redirect" title="Customer loyalty">customer loyalty</a> account information, <a href="/wiki/Debit_card" title="Debit card">debit</a> and <a href="/wiki/Credit_card" title="Credit card">credit card</a> numbers,<sup id="cite_ref-FOOTNOTEFowler201613_69-1" class="reference"><a href="#cite_note-FOOTNOTEFowler201613-69"><span class="cite-bracket">[</span>69<span class="cite-bracket">]</span></a></sup> and personal health information (see <a href="/wiki/Medical_data_breach" title="Medical data breach">medical data breach</a>).<sup id="cite_ref-FOOTNOTEFowler201614_72-0" class="reference"><a href="#cite_note-FOOTNOTEFowler201614-72"><span class="cite-bracket">[</span>72<span class="cite-bracket">]</span></a></sup> This information may be used for a variety of purposes, such as <a href="/wiki/Spamming" title="Spamming">spamming</a>, obtaining products with a victim's loyalty or payment information, <a href="/wiki/Drug_fraud" title="Drug fraud">prescription drug fraud</a>, <a href="/wiki/Insurance_fraud" title="Insurance fraud">insurance fraud</a>,<sup id="cite_ref-FOOTNOTEFowler201613–14_73-0" class="reference"><a href="#cite_note-FOOTNOTEFowler201613–14-73"><span class="cite-bracket">[</span>73<span class="cite-bracket">]</span></a></sup> and especially <a href="/wiki/Identity_theft" title="Identity theft">identity theft</a>.<sup id="cite_ref-FOOTNOTEAl-TurjmanSalama2020244_43-1" class="reference"><a href="#cite_note-FOOTNOTEAl-TurjmanSalama2020244-43"><span class="cite-bracket">[</span>43<span class="cite-bracket">]</span></a></sup> Consumer losses from a breach are usually a negative <a href="/wiki/Externality" title="Externality">externality</a> for the business.<sup id="cite_ref-FOOTNOTESloanWarner2019104_74-0" class="reference"><a href="#cite_note-FOOTNOTESloanWarner2019104-74"><span class="cite-bracket">[</span>74<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Critical_infrastructure">Critical infrastructure</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=10" title="Edit section: Critical infrastructure"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:2021-05-15_14_33_28_Out-of-service_gas_pumps_due_to_panic_buying_after_the_Colonial_Pipeline_cyberattack_at_the_Wawa_along_Air_and_Space_Museum_Parkway_in_Oak_Hill,_Fairfax_County,_Virginia.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/1/1d/2021-05-15_14_33_28_Out-of-service_gas_pumps_due_to_panic_buying_after_the_Colonial_Pipeline_cyberattack_at_the_Wawa_along_Air_and_Space_Museum_Parkway_in_Oak_Hill%2C_Fairfax_County%2C_Virginia.jpg/220px-thumbnail.jpg" decoding="async" width="220" height="165" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/1/1d/2021-05-15_14_33_28_Out-of-service_gas_pumps_due_to_panic_buying_after_the_Colonial_Pipeline_cyberattack_at_the_Wawa_along_Air_and_Space_Museum_Parkway_in_Oak_Hill%2C_Fairfax_County%2C_Virginia.jpg/330px-thumbnail.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/1/1d/2021-05-15_14_33_28_Out-of-service_gas_pumps_due_to_panic_buying_after_the_Colonial_Pipeline_cyberattack_at_the_Wawa_along_Air_and_Space_Museum_Parkway_in_Oak_Hill%2C_Fairfax_County%2C_Virginia.jpg/440px-thumbnail.jpg 2x" data-file-width="4032" data-file-height="3024" /></a><figcaption>Out-of-service gas pumps due to <a href="/wiki/Panic_buying" title="Panic buying">panic buying</a> after the <a href="/wiki/Colonial_Pipeline_cyberattack" class="mw-redirect" title="Colonial Pipeline cyberattack">Colonial Pipeline cyberattack</a> in <a href="/wiki/Oak_Hill,_Fairfax_County,_Virginia" title="Oak Hill, Fairfax County, Virginia">Oak Hill, Virginia</a></figcaption></figure> <p><a href="/wiki/Critical_infrastructure" title="Critical infrastructure">Critical infrastructure</a> is that considered most essential—such as healthcare, water supply, transport, and financial services—which has been increasingly governed by <a href="/wiki/Cyber-physical_systems" class="mw-redirect" title="Cyber-physical systems">cyber-physical systems</a> that depend on network access for their functionality.<sup id="cite_ref-FOOTNOTELehto202236_75-0" class="reference"><a href="#cite_note-FOOTNOTELehto202236-75"><span class="cite-bracket">[</span>75<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-FOOTNOTEVähäkainuLehtoKariluoto2022285_76-0" class="reference"><a href="#cite_note-FOOTNOTEVähäkainuLehtoKariluoto2022285-76"><span class="cite-bracket">[</span>76<span class="cite-bracket">]</span></a></sup> For years, writers have warned of cataclysmic consequences of cyberattacks that have failed to materialize as of 2023<sup class="plainlinks noexcerpt noprint asof-tag update" style="display:none;"><a class="external text" href="https://en.wikipedia.org/w/index.php?title=Cyberattack&action=edit">[update]</a></sup>.<sup id="cite_ref-FOOTNOTEShandlerGomez2023359_77-0" class="reference"><a href="#cite_note-FOOTNOTEShandlerGomez2023359-77"><span class="cite-bracket">[</span>77<span class="cite-bracket">]</span></a></sup> These extreme scenarios could still occur, but many experts consider that it is unlikely that challenges in inflicting physical damage or spreading terror can be overcome.<sup id="cite_ref-FOOTNOTEShandlerGomez2023359_77-1" class="reference"><a href="#cite_note-FOOTNOTEShandlerGomez2023359-77"><span class="cite-bracket">[</span>77<span class="cite-bracket">]</span></a></sup> Smaller-scale cyberattacks, sometimes resulting in interruption of essential services, regularly occur.<sup id="cite_ref-FOOTNOTELehto2022''passim''_78-0" class="reference"><a href="#cite_note-FOOTNOTELehto2022''passim''-78"><span class="cite-bracket">[</span>78<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Corporations_and_organizations">Corporations and organizations</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=11" title="Edit section: Corporations and organizations"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>There is little empirical evidence of economic harm (such as <a href="/wiki/Reputational_damage" title="Reputational damage">reputational damage</a>) from breaches except the direct cost<sup id="cite_ref-FOOTNOTEMakridis20211_79-0" class="reference"><a href="#cite_note-FOOTNOTEMakridis20211-79"><span class="cite-bracket">[</span>79<span class="cite-bracket">]</span></a></sup> for such matters as legal, technical, and public relations recovery efforts.<sup id="cite_ref-FOOTNOTEFowler201621_80-0" class="reference"><a href="#cite_note-FOOTNOTEFowler201621-80"><span class="cite-bracket">[</span>80<span class="cite-bracket">]</span></a></sup> Studies that have attempted to correlate cyberattacks to short-term declines in <a href="/wiki/Share_price" title="Share price">stock prices</a> have found contradictory results, with some finding modest losses, others finding no effect, and some researchers criticizing these studies on methodological grounds. The effect on stock price may vary depending on the type of attack.<sup id="cite_ref-FOOTNOTEAgrafiotis_''et_al.''20185_81-0" class="reference"><a href="#cite_note-FOOTNOTEAgrafiotis_''et_al.''20185-81"><span class="cite-bracket">[</span>81<span class="cite-bracket">]</span></a></sup> Some experts have argued that the evidence suggests there is not enough direct costs or reputational damage from breaches to sufficiently <a href="/wiki/Incentivize" class="mw-redirect" title="Incentivize">incentivize</a> their prevention.<sup id="cite_ref-FOOTNOTEMakridis20211,_7_82-0" class="reference"><a href="#cite_note-FOOTNOTEMakridis20211,_7-82"><span class="cite-bracket">[</span>82<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-FOOTNOTESloanWarner201964_83-0" class="reference"><a href="#cite_note-FOOTNOTESloanWarner201964-83"><span class="cite-bracket">[</span>83<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Governments">Governments</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=12" title="Edit section: Governments"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Page_of_Ministerio_de_Hacienda_of_Costa_Rica.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/c/c9/Page_of_Ministerio_de_Hacienda_of_Costa_Rica.png/220px-Page_of_Ministerio_de_Hacienda_of_Costa_Rica.png" decoding="async" width="220" height="102" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/c/c9/Page_of_Ministerio_de_Hacienda_of_Costa_Rica.png/330px-Page_of_Ministerio_de_Hacienda_of_Costa_Rica.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/c/c9/Page_of_Ministerio_de_Hacienda_of_Costa_Rica.png/440px-Page_of_Ministerio_de_Hacienda_of_Costa_Rica.png 2x" data-file-width="1332" data-file-height="620" /></a><figcaption>In 2022, government websites of Costa Rica <a href="/wiki/2022_Costa_Rican_ransomware_attack" title="2022 Costa Rican ransomware attack">were down because of</a> a <a href="/wiki/Ransomware" title="Ransomware">ransomware</a> attack.</figcaption></figure> <p>Government websites and services are among those affected by cyberattacks.<sup id="cite_ref-FOOTNOTELehto2022''passim''_78-1" class="reference"><a href="#cite_note-FOOTNOTELehto2022''passim''-78"><span class="cite-bracket">[</span>78<span class="cite-bracket">]</span></a></sup> Some experts hypothesize that cyberattacks weaken societal trust or trust in the government, but as of 2023<sup class="plainlinks noexcerpt noprint asof-tag update" style="display:none;"><a class="external text" href="https://en.wikipedia.org/w/index.php?title=Cyberattack&action=edit">[update]</a></sup> this notion has only limited evidence.<sup id="cite_ref-FOOTNOTEShandlerGomez2023359_77-2" class="reference"><a href="#cite_note-FOOTNOTEShandlerGomez2023359-77"><span class="cite-bracket">[</span>77<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Responses">Responses</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=13" title="Edit section: Responses"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Computer_security_incident_management" title="Computer security incident management">Computer security incident management</a></div> <p>Responding quickly to attacks is an effective way to limit the damage. The response is likely to require a wide variety of skills, from technical investigation to legal and public relations.<sup id="cite_ref-FOOTNOTETjoa_''et_al.''202492_84-0" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''202492-84"><span class="cite-bracket">[</span>84<span class="cite-bracket">]</span></a></sup> Because of the prevalence of cyberattacks, some companies plan their incident response before any attack is detected, and may designate a <a href="/wiki/Computer_emergency_response_team" title="Computer emergency response team">computer emergency response team</a> to be prepared to handle incidents.<sup id="cite_ref-FOOTNOTEBareja202113,_16_85-0" class="reference"><a href="#cite_note-FOOTNOTEBareja202113,_16-85"><span class="cite-bracket">[</span>85<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-FOOTNOTETjoa_''et_al.''202491–93_86-0" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''202491–93-86"><span class="cite-bracket">[</span>86<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Detection">Detection</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=14" title="Edit section: Detection"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Many attacks are never detected. Of those that are, the average time to discovery is 197 days.<sup id="cite_ref-FOOTNOTEBareja202113–14_87-0" class="reference"><a href="#cite_note-FOOTNOTEBareja202113–14-87"><span class="cite-bracket">[</span>87<span class="cite-bracket">]</span></a></sup> Some systems can detect and flag anomalies that may indicate an attack, using such technology as <a href="/wiki/Antivirus" class="mw-redirect" title="Antivirus">antivirus</a>, <a href="/wiki/Firewall_(computing)" title="Firewall (computing)">firewall</a>, or an <a href="/wiki/Intrusion_detection_system" title="Intrusion detection system">intrusion detection system</a>. Once suspicious activity is suspected, investigators look for <a href="/w/index.php?title=Indicators_of_attack&action=edit&redlink=1" class="new" title="Indicators of attack (page does not exist)">indicators of attack</a> and <a href="/wiki/Indicators_of_compromise" class="mw-redirect" title="Indicators of compromise">indicators of compromise</a>.<sup id="cite_ref-FOOTNOTETjoa_''et_al.''202494_88-0" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''202494-88"><span class="cite-bracket">[</span>88<span class="cite-bracket">]</span></a></sup> Discovery is quicker and more likely if the attack targets information availability (for example with a <a href="/wiki/Denial-of-service_attack" title="Denial-of-service attack">denial-of-service attack</a>) rather than integrity (modifying data) or confidentiality (copying data without changing it).<sup id="cite_ref-FOOTNOTEOppenheimer202439_89-0" class="reference"><a href="#cite_note-FOOTNOTEOppenheimer202439-89"><span class="cite-bracket">[</span>89<span class="cite-bracket">]</span></a></sup> State actors are more likely to keep the attack secret. Sophisticated attacks using valuable exploits are more less likely to be detected or announced – as the perpetrator wants to protect the usefulness of the exploit.<sup id="cite_ref-FOOTNOTEOppenheimer202439_89-1" class="reference"><a href="#cite_note-FOOTNOTEOppenheimer202439-89"><span class="cite-bracket">[</span>89<span class="cite-bracket">]</span></a></sup> </p><p>Evidence collection is done immediately, prioritizing <a href="/wiki/Volatile_memory" title="Volatile memory">volatile</a> evidence that is likely to be erased quickly.<sup id="cite_ref-FOOTNOTETjoa_''et_al.''202495_90-0" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''202495-90"><span class="cite-bracket">[</span>90<span class="cite-bracket">]</span></a></sup> Gathering data about the breach can facilitate later litigation or criminal prosecution,<sup id="cite_ref-FOOTNOTEFowler201681–82_91-0" class="reference"><a href="#cite_note-FOOTNOTEFowler201681–82-91"><span class="cite-bracket">[</span>91<span class="cite-bracket">]</span></a></sup> but only if the data is gathered according to legal standards and the <a href="/wiki/Chain_of_custody" title="Chain of custody">chain of custody</a> is maintained.<sup id="cite_ref-FOOTNOTEFowler201683_92-0" class="reference"><a href="#cite_note-FOOTNOTEFowler201683-92"><span class="cite-bracket">[</span>92<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-FOOTNOTETjoa_''et_al.''202495_90-1" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''202495-90"><span class="cite-bracket">[</span>90<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Recovery">Recovery</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=15" title="Edit section: Recovery"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Containing the affected system is often a high priority after an attack, and may be enacted by shutoff, isolation, use of a sandbox system to find out more about the adversary<sup id="cite_ref-FOOTNOTETjoa_''et_al.''202495_90-2" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''202495-90"><span class="cite-bracket">[</span>90<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Software_patch" class="mw-redirect" title="Software patch">patching</a> the vulnerability, and <a href="/wiki/Software_build" title="Software build">rebuilding</a>.<sup id="cite_ref-FOOTNOTEFowler2016120–122_93-0" class="reference"><a href="#cite_note-FOOTNOTEFowler2016120–122-93"><span class="cite-bracket">[</span>93<span class="cite-bracket">]</span></a></sup> Once the exact way that the system was compromised is identified, there is typically only one or two technical vulnerabilities that need to be addressed in order to contain the breach and prevent it from reoccurring.<sup id="cite_ref-FOOTNOTEFowler2016115_94-0" class="reference"><a href="#cite_note-FOOTNOTEFowler2016115-94"><span class="cite-bracket">[</span>94<span class="cite-bracket">]</span></a></sup> A <a href="/wiki/Penetration_test" title="Penetration test">penetration test</a> can then verify that the fix is working as expected.<sup id="cite_ref-FOOTNOTEFowler2016116_95-0" class="reference"><a href="#cite_note-FOOTNOTEFowler2016116-95"><span class="cite-bracket">[</span>95<span class="cite-bracket">]</span></a></sup> If <a href="/wiki/Malware" title="Malware">malware</a> is involved, the organization must investigate and close all infiltration and exfiltration vectors, as well as locate and remove all malware from its systems.<sup id="cite_ref-FOOTNOTEFowler2016117–118_96-0" class="reference"><a href="#cite_note-FOOTNOTEFowler2016117–118-96"><span class="cite-bracket">[</span>96<span class="cite-bracket">]</span></a></sup> Containment can compromise investigation, and some tactics (such as shutting down servers) can violate the company's contractual obligations.<sup id="cite_ref-FOOTNOTEFowler2016124_97-0" class="reference"><a href="#cite_note-FOOTNOTEFowler2016124-97"><span class="cite-bracket">[</span>97<span class="cite-bracket">]</span></a></sup> After the breach is fully contained, the company can then work on restoring all systems to operational.<sup id="cite_ref-FOOTNOTEFowler2016188_98-0" class="reference"><a href="#cite_note-FOOTNOTEFowler2016188-98"><span class="cite-bracket">[</span>98<span class="cite-bracket">]</span></a></sup> Maintaining a <a href="/wiki/Backup" title="Backup">backup</a> and having tested incident response procedures are used to improve recovery.<sup id="cite_ref-FOOTNOTETjoa_''et_al.''202415_25-1" class="reference"><a href="#cite_note-FOOTNOTETjoa_''et_al.''202415-25"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Attribution">Attribution</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=16" title="Edit section: Attribution"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Cyber_attribution" title="Cyber attribution">Cyber attribution</a> and <a href="/wiki/Cyber_forensics" class="mw-redirect" title="Cyber forensics">Cyber forensics</a></div> <p>Attributing a cyberattack is difficult, and of limited interest to companies that are targeted by cyberattacks. In contrast, <a href="/wiki/Secret_services" class="mw-redirect" title="Secret services">secret services</a> often have a compelling interest in finding out whether a state is behind the attack.<sup id="cite_ref-FOOTNOTESkopikPahi20201_99-0" class="reference"><a href="#cite_note-FOOTNOTESkopikPahi20201-99"><span class="cite-bracket">[</span>99<span class="cite-bracket">]</span></a></sup> Unlike attacks carried out in person, determining the entity behind a cyberattack is difficult.<sup id="cite_ref-FOOTNOTELiLiu20218177_100-0" class="reference"><a href="#cite_note-FOOTNOTELiLiu20218177-100"><span class="cite-bracket">[</span>100<span class="cite-bracket">]</span></a></sup> A further challenge in attribution of cyberattacks is the possibility of a <a href="/wiki/False_flag_attack" class="mw-redirect" title="False flag attack">false flag attack</a>, where the actual perpetrator makes it appear that someone else caused the attack.<sup id="cite_ref-FOOTNOTESkopikPahi20201_99-1" class="reference"><a href="#cite_note-FOOTNOTESkopikPahi20201-99"><span class="cite-bracket">[</span>99<span class="cite-bracket">]</span></a></sup> Every stage of the attack may leave <a href="/wiki/Digital_artifact" title="Digital artifact">artifacts</a>, such as entries in log files, that can be used to help determine the attacker's goals and identity.<sup id="cite_ref-FOOTNOTESkopikPahi20201,_6_101-0" class="reference"><a href="#cite_note-FOOTNOTESkopikPahi20201,_6-101"><span class="cite-bracket">[</span>101<span class="cite-bracket">]</span></a></sup> In the aftermath of an attack, investigators often begin by saving as many artifacts as they can find,<sup id="cite_ref-FOOTNOTESkopikPahi202012_102-0" class="reference"><a href="#cite_note-FOOTNOTESkopikPahi202012-102"><span class="cite-bracket">[</span>102<span class="cite-bracket">]</span></a></sup> and then try to determine the attacker.<sup id="cite_ref-FOOTNOTESkopikPahi202016_103-0" class="reference"><a href="#cite_note-FOOTNOTESkopikPahi202016-103"><span class="cite-bracket">[</span>103<span class="cite-bracket">]</span></a></sup> Law enforcement agencies may investigate cyber incidents<sup id="cite_ref-FOOTNOTEFowler201644_104-0" class="reference"><a href="#cite_note-FOOTNOTEFowler201644-104"><span class="cite-bracket">[</span>104<span class="cite-bracket">]</span></a></sup> although the hackers responsible are rarely caught.<sup id="cite_ref-FOOTNOTESoloveHartzog202258_105-0" class="reference"><a href="#cite_note-FOOTNOTESoloveHartzog202258-105"><span class="cite-bracket">[</span>105<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Legality">Legality</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=17" title="Edit section: Legality"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Tallinn_Manual" title="Tallinn Manual">Tallinn Manual</a></div> <p>Most states agree that cyberattacks are regulated under the laws governing the <a href="/wiki/Use_of_force_in_international_law" title="Use of force in international law">use of force in international law</a>,<sup id="cite_ref-FOOTNOTEAravindakshan2021299_106-0" class="reference"><a href="#cite_note-FOOTNOTEAravindakshan2021299-106"><span class="cite-bracket">[</span>106<span class="cite-bracket">]</span></a></sup> and therefore cyberattacks as a form of warfare are likely to violate the prohibition of aggression.<sup id="cite_ref-FOOTNOTELilienthalAhmad2015399_107-0" class="reference"><a href="#cite_note-FOOTNOTELilienthalAhmad2015399-107"><span class="cite-bracket">[</span>107<span class="cite-bracket">]</span></a></sup> Therefore, they could be prosecuted as a <a href="/wiki/Crime_of_aggression" title="Crime of aggression">crime of aggression</a>.<sup id="cite_ref-Verbruggen_108-0" class="reference"><a href="#cite_note-Verbruggen-108"><span class="cite-bracket">[</span>108<span class="cite-bracket">]</span></a></sup> There is also agreement that cyberattacks are governed by <a href="/wiki/International_humanitarian_law" title="International humanitarian law">international humanitarian law</a>,<sup id="cite_ref-FOOTNOTEAravindakshan2021299_106-1" class="reference"><a href="#cite_note-FOOTNOTEAravindakshan2021299-106"><span class="cite-bracket">[</span>106<span class="cite-bracket">]</span></a></sup> and if they target civilian infrastructure, they could be prosecuted as a <a href="/wiki/War_crime" title="War crime">war crime</a>, <a href="/wiki/Crime_against_humanity" class="mw-redirect" title="Crime against humanity">crime against humanity</a>, or act of <a href="/wiki/Genocide" title="Genocide">genocide</a>.<sup id="cite_ref-Verbruggen_108-1" class="reference"><a href="#cite_note-Verbruggen-108"><span class="cite-bracket">[</span>108<span class="cite-bracket">]</span></a></sup> International courts cannot enforce these laws without sound attribution of the attack, without which countermeasures by a state are not legal either.<sup id="cite_ref-FOOTNOTEAravindakshan2021298_109-0" class="reference"><a href="#cite_note-FOOTNOTEAravindakshan2021298-109"><span class="cite-bracket">[</span>109<span class="cite-bracket">]</span></a></sup> </p><p>In many countries, cyberattacks are prosecutable under various laws aimed at <a href="/wiki/Cybercrime" title="Cybercrime">cybercrime</a>.<sup id="cite_ref-110" class="reference"><a href="#cite_note-110"><span class="cite-bracket">[</span>110<span class="cite-bracket">]</span></a></sup> Attribution of the attack <a href="/wiki/Beyond_reasonable_doubt" class="mw-redirect" title="Beyond reasonable doubt">beyond reasonable doubt</a> to the accused is also a major challenge in criminal proceedings.<sup id="cite_ref-FOOTNOTEAravindakshan2021296_111-0" class="reference"><a href="#cite_note-FOOTNOTEAravindakshan2021296-111"><span class="cite-bracket">[</span>111<span class="cite-bracket">]</span></a></sup> In 2021, <a href="/wiki/United_Nations_member_states" class="mw-redirect" title="United Nations member states">United Nations member states</a> began negotiating a <a href="/w/index.php?title=United_Nations_Cybercrime_Treaty&action=edit&redlink=1" class="new" title="United Nations Cybercrime Treaty (page does not exist)">draft cybercrime treaty</a>.<sup id="cite_ref-112" class="reference"><a href="#cite_note-112"><span class="cite-bracket">[</span>112<span class="cite-bracket">]</span></a></sup> </p><p>Many jurisdictions have <a href="/wiki/Data_breach_notification_laws" title="Data breach notification laws">data breach notification laws</a> that require organizations to notify people whose personal data has been compromised in a cyberattack.<sup id="cite_ref-FOOTNOTESoloveHartzog202210_113-0" class="reference"><a href="#cite_note-FOOTNOTESoloveHartzog202210-113"><span class="cite-bracket">[</span>113<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=18" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/Attack_patterns" title="Attack patterns">Attack patterns</a> – computer science concept regarding group of rigorous methods for finding bugs or errors in code related to computer security<span style="display:none" class="category-wikidata-fallback-annotation">Pages displaying wikidata descriptions as a fallback</span></li> <li><a href="/wiki/Black_hat_(computer_security)" title="Black hat (computer security)">Black hat (computer security)</a> – Computer hacker with malicious intent</li> <li><a href="/wiki/Cyberattacks_against_infrastructure" title="Cyberattacks against infrastructure">Cyberattacks against infrastructure</a></li> <li><a href="/wiki/Cyberattacks_by_country" title="Cyberattacks by country">Cyberattacks by country</a></li> <li><a href="/wiki/Security_hacker" title="Security hacker">Security hacker</a> – Computer security term; someone who hacks computer systems</li></ul> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=19" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist"> <div class="mw-references-wrap mw-references-columns"><ol class="references"> <li id="cite_note-FOOTNOTELiLiu20218176–8186-1"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELiLiu20218176–8186_1-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLiLiu2021">Li & Liu 2021</a>, pp. 8176–8186.</span> </li> <li id="cite_note-FOOTNOTEAsbaşTuzlukaya2022303-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEAsbaşTuzlukaya2022303_2-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFAsbaşTuzlukaya2022">Asbaş & Tuzlukaya 2022</a>, p. 303.</span> </li> <li id="cite_note-FOOTNOTELiLiu20218179-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELiLiu20218179_3-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLiLiu2021">Li & Liu 2021</a>, p. 8179.</span> </li> <li id="cite_note-FOOTNOTELiLiu20218177–8179-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELiLiu20218177–8179_4-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLiLiu2021">Li & Liu 2021</a>, pp. 8177–8179.</span> </li> <li id="cite_note-FOOTNOTELiLiu20218183-5"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTELiLiu20218183_5-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTELiLiu20218183_5-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFLiLiu2021">Li & Liu 2021</a>, p. 8183.</span> </li> <li id="cite_note-FOOTNOTETjoa_''et_al.''202414-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTETjoa_''et_al.''202414_6-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFTjoa_et_al.2024">Tjoa <i>et al.</i> 2024</a>, p. 14.</span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite id="CITEREFFosco2018" class="citation news cs1">Fosco, Molly (30 October 2018). <a rel="nofollow" class="external text" href="https://www.ozy.com/fast-forward/will-ai-save-us-from-the-next-cyber-attack/88428">"Will Artificial Intelligence Save Us From the Next Cyber Attack?"</a>. Fast Forward. <i>OZY</i><span class="reference-accessdate">. Retrieved <span class="nowrap">30 October</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=OZY&rft.atitle=Will+Artificial+Intelligence+Save+Us+From+the+Next+Cyber+Attack%3F&rft.date=2018-10-30&rft.aulast=Fosco&rft.aufirst=Molly&rft_id=https%3A%2F%2Fwww.ozy.com%2Ffast-forward%2Fwill-ai-save-us-from-the-next-cyber-attack%2F88428&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSobers2021" class="citation web cs1">Sobers, Rob (16 March 2021). <a rel="nofollow" class="external text" href="https://www.varonis.com/blog/cybersecurity-statistics/">"134 Cybersecurity Statistics and Trends for 2021"</a>. <i>Inside Out Security</i>. Varonis<span class="reference-accessdate">. Retrieved <span class="nowrap">27 February</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Inside+Out+Security&rft.atitle=134+Cybersecurity+Statistics+and+Trends+for+2021&rft.date=2021-03-16&rft.aulast=Sobers&rft.aufirst=Rob&rft_id=https%3A%2F%2Fwww.varonis.com%2Fblog%2Fcybersecurity-statistics%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></span> </li> <li id="cite_note-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-9">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.gartner.com/en/documents/3889055/forecast-analysis-information-security-worldwide-2q18-up">"Forecast Analysis: Information Security, Worldwide, 2Q18 Update"</a>. <i>Gartner</i><span class="reference-accessdate">. Retrieved <span class="nowrap">27 February</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Gartner&rft.atitle=Forecast+Analysis%3A+Information+Security%2C+Worldwide%2C+2Q18+Update&rft_id=https%3A%2F%2Fwww.gartner.com%2Fen%2Fdocuments%2F3889055%2Fforecast-analysis-information-security-worldwide-2q18-up&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTELinkovKott20191-10"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTELinkovKott20191_10-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTELinkovKott20191_10-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-FOOTNOTELinkovKott20191_10-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFLinkovKott2019">Linkov & Kott 2019</a>, p. 1.</span> </li> <li id="cite_note-FOOTNOTEAblonBogart20171-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEAblonBogart20171_11-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFAblonBogart2017">Ablon & Bogart 2017</a>, p. 1.</span> </li> <li id="cite_note-FOOTNOTEAblonBogart20172-12"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEAblonBogart20172_12-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEAblonBogart20172_12-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFAblonBogart2017">Ablon & Bogart 2017</a>, p. 2.</span> </li> <li id="cite_note-FOOTNOTEDaswaniElbayadi202125-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEDaswaniElbayadi202125_13-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFDaswaniElbayadi2021">Daswani & Elbayadi 2021</a>, p. 25.</span> </li> <li id="cite_note-FOOTNOTESeaman202047–48-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTESeaman202047–48_14-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFSeaman2020">Seaman 2020</a>, pp. 47–48.</span> </li> <li id="cite_note-FOOTNOTEDaswaniElbayadi202126–27-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEDaswaniElbayadi202126–27_15-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFDaswaniElbayadi2021">Daswani & Elbayadi 2021</a>, pp. 26–27.</span> </li> <li id="cite_note-FOOTNOTESloanWarner2019104–105-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTESloanWarner2019104–105_16-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFSloanWarner2019">Sloan & Warner 2019</a>, pp. 104–105.</span> </li> <li id="cite_note-FOOTNOTEHaberHibbert201810-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEHaberHibbert201810_17-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFHaberHibbert2018">Haber & Hibbert 2018</a>, p. 10.</span> </li> <li id="cite_note-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-18">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSeidPopovBlix2024" class="citation journal cs1">Seid, Elias; Popov, Oliver; Blix, Fredrik (10 January 2024). <a rel="nofollow" class="external text" href="https://doi.org/10.3390%2Fjcp4010004">"Security Attack Behavioural Pattern Analysis for Critical Service Providers"</a>. <i>Journal of Cybersecurity and Privacy</i>. <b>4</b> (1): <span class="nowrap">55–</span>75. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.3390%2Fjcp4010004">10.3390/jcp4010004</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2624-800X">2624-800X</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Journal+of+Cybersecurity+and+Privacy&rft.atitle=Security+Attack+Behavioural+Pattern+Analysis+for+Critical+Service+Providers&rft.volume=4&rft.issue=1&rft.pages=%3Cspan+class%3D%22nowrap%22%3E55-%3C%2Fspan%3E75&rft.date=2024-01-10&rft_id=info%3Adoi%2F10.3390%2Fjcp4010004&rft.issn=2624-800X&rft.aulast=Seid&rft.aufirst=Elias&rft.au=Popov%2C+Oliver&rft.au=Blix%2C+Fredrik&rft_id=https%3A%2F%2Fdoi.org%2F10.3390%252Fjcp4010004&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTETjoa_''et_al.''202465-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTETjoa_''et_al.''202465_19-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFTjoa_et_al.2024">Tjoa <i>et al.</i> 2024</a>, p. 65.</span> </li> <li id="cite_note-FOOTNOTELinkovKott20192,_7-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELinkovKott20192,_7_20-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLinkovKott2019">Linkov & Kott 2019</a>, pp. 2, 7.</span> </li> <li id="cite_note-FOOTNOTELinkovKott20192-21"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTELinkovKott20192_21-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTELinkovKott20192_21-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-FOOTNOTELinkovKott20192_21-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFLinkovKott2019">Linkov & Kott 2019</a>, p. 2.</span> </li> <li id="cite_note-FOOTNOTETjoa_''_et_al.''20243-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTETjoa_''_et_al.''20243_22-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFTjoa_et_al.2024">Tjoa <i> et al.</i> 2024</a>, p. 3.</span> </li> <li id="cite_note-FOOTNOTELinkovKott20197-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELinkovKott20197_23-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLinkovKott2019">Linkov & Kott 2019</a>, p. 7.</span> </li> <li id="cite_note-FOOTNOTELinkovKott201919–20-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELinkovKott201919–20_24-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLinkovKott2019">Linkov & Kott 2019</a>, pp. 19–20.</span> </li> <li id="cite_note-FOOTNOTETjoa_''et_al.''202415-25"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTETjoa_''et_al.''202415_25-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTETjoa_''et_al.''202415_25-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFTjoa_et_al.2024">Tjoa <i>et al.</i> 2024</a>, p. 15.</span> </li> <li id="cite_note-FOOTNOTEAblonBogart20173-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEAblonBogart20173_26-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFAblonBogart2017">Ablon & Bogart 2017</a>, p. 3.</span> </li> <li id="cite_note-FOOTNOTELibickiAblonWebb201549–50-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELibickiAblonWebb201549–50_27-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLibickiAblonWebb2015">Libicki, Ablon & Webb 2015</a>, pp. 49–50.</span> </li> <li id="cite_note-FOOTNOTEAgrafiotis_''et_al.''20182-28"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEAgrafiotis_''et_al.''20182_28-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEAgrafiotis_''et_al.''20182_28-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-FOOTNOTEAgrafiotis_''et_al.''20182_28-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFAgrafiotis_et_al.2018">Agrafiotis <i>et al.</i> 2018</a>, p. 2.</span> </li> <li id="cite_note-FOOTNOTELinkovKott201920-29"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTELinkovKott201920_29-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTELinkovKott201920_29-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFLinkovKott2019">Linkov & Kott 2019</a>, p. 20.</span> </li> <li id="cite_note-FOOTNOTEDaswaniElbayadi202131–32-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEDaswaniElbayadi202131–32_30-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFDaswaniElbayadi2021">Daswani & Elbayadi 2021</a>, pp. 31–32.</span> </li> <li id="cite_note-FOOTNOTETjoa_''et_al.''202463-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTETjoa_''et_al.''202463_31-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFTjoa_et_al.2024">Tjoa <i>et al.</i> 2024</a>, p. 63.</span> </li> <li id="cite_note-FOOTNOTETjoa_''et_al.''202468,_70-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTETjoa_''et_al.''202468,_70_32-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFTjoa_et_al.2024">Tjoa <i>et al.</i> 2024</a>, pp. 68, 70.</span> </li> <li id="cite_note-FOOTNOTETjoa_''_et_al.''20244–5-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTETjoa_''_et_al.''20244–5_33-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFTjoa_et_al.2024">Tjoa <i> et al.</i> 2024</a>, pp. 4–5.</span> </li> <li id="cite_note-FOOTNOTESkopikPahi20204-34"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTESkopikPahi20204_34-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTESkopikPahi20204_34-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFSkopikPahi2020">Skopik & Pahi 2020</a>, p. 4.</span> </li> <li id="cite_note-FOOTNOTESkopikPahi20205-35"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTESkopikPahi20205_35-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTESkopikPahi20205_35-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-FOOTNOTESkopikPahi20205_35-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-FOOTNOTESkopikPahi20205_35-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFSkopikPahi2020">Skopik & Pahi 2020</a>, p. 5.</span> </li> <li id="cite_note-FOOTNOTEAl-TurjmanSalama2020242-36"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEAl-TurjmanSalama2020242_36-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEAl-TurjmanSalama2020242_36-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-FOOTNOTEAl-TurjmanSalama2020242_36-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFAl-TurjmanSalama2020">Al-Turjman & Salama 2020</a>, p. 242.</span> </li> <li id="cite_note-FOOTNOTEAl-TurjmanSalama2020243–244-37"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEAl-TurjmanSalama2020243–244_37-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFAl-TurjmanSalama2020">Al-Turjman & Salama 2020</a>, pp. 243–244.</span> </li> <li id="cite_note-FOOTNOTETjoa_et_al.20243-38"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTETjoa_et_al.20243_38-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTETjoa_et_al.20243_38-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFTjoa_et_al.2024">Tjoa et al. 2024</a>, p. 3.</span> </li> <li id="cite_note-FOOTNOTESkopikPahi20206-39"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTESkopikPahi20206_39-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTESkopikPahi20206_39-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFSkopikPahi2020">Skopik & Pahi 2020</a>, p. 6.</span> </li> <li id="cite_note-FOOTNOTESkopikPahi20205–6-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTESkopikPahi20205–6_40-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFSkopikPahi2020">Skopik & Pahi 2020</a>, pp. 5–6.</span> </li> <li id="cite_note-FOOTNOTETjoa_''et_al.''202417-41"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTETjoa_''et_al.''202417_41-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTETjoa_''et_al.''202417_41-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFTjoa_et_al.2024">Tjoa <i>et al.</i> 2024</a>, p. 17.</span> </li> <li id="cite_note-FOOTNOTEAl-TurjmanSalama2020243-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEAl-TurjmanSalama2020243_42-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFAl-TurjmanSalama2020">Al-Turjman & Salama 2020</a>, p. 243.</span> </li> <li id="cite_note-FOOTNOTEAl-TurjmanSalama2020244-43"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEAl-TurjmanSalama2020244_43-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEAl-TurjmanSalama2020244_43-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFAl-TurjmanSalama2020">Al-Turjman & Salama 2020</a>, p. 244.</span> </li> <li id="cite_note-FOOTNOTEHyslip2020828-44"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEHyslip2020828_44-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFHyslip2020">Hyslip 2020</a>, p. 828.</span> </li> <li id="cite_note-FOOTNOTETjoa_''et_al.''20243-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTETjoa_''et_al.''20243_45-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFTjoa_et_al.2024">Tjoa <i>et al.</i> 2024</a>, p. 3.</span> </li> <li id="cite_note-FOOTNOTETjoa_''et_al.''20249-46"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTETjoa_''et_al.''20249_46-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFTjoa_et_al.2024">Tjoa <i>et al.</i> 2024</a>, p. 9.</span> </li> <li id="cite_note-FOOTNOTETjoa_''et_al.''202416-47"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTETjoa_''et_al.''202416_47-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTETjoa_''et_al.''202416_47-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-FOOTNOTETjoa_''et_al.''202416_47-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFTjoa_et_al.2024">Tjoa <i>et al.</i> 2024</a>, p. 16.</span> </li> <li id="cite_note-FOOTNOTETjoa_''et_al.''202416–17-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTETjoa_''et_al.''202416–17_48-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFTjoa_et_al.2024">Tjoa <i>et al.</i> 2024</a>, pp. 16–17.</span> </li> <li id="cite_note-FOOTNOTELibickiAblonWebb201544–45-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELibickiAblonWebb201544–45_49-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLibickiAblonWebb2015">Libicki, Ablon & Webb 2015</a>, pp. 44–45.</span> </li> <li id="cite_note-FOOTNOTELibickiAblonWebb201544,_46-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELibickiAblonWebb201544,_46_50-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLibickiAblonWebb2015">Libicki, Ablon & Webb 2015</a>, pp. 44, 46.</span> </li> <li id="cite_note-FOOTNOTEHyslip2020831-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEHyslip2020831_51-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFHyslip2020">Hyslip 2020</a>, p. 831.</span> </li> <li id="cite_note-FOOTNOTEPerlroth202142-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEPerlroth202142_52-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFPerlroth2021">Perlroth 2021</a>, p. 42.</span> </li> <li id="cite_note-FOOTNOTEPerlroth202158-53"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEPerlroth202158_53-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFPerlroth2021">Perlroth 2021</a>, p. 58.</span> </li> <li id="cite_note-FOOTNOTESoodEnbody2014117-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTESoodEnbody2014117_54-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFSoodEnbody2014">Sood & Enbody 2014</a>, p. 117.</span> </li> <li id="cite_note-FOOTNOTEHyslip2020816-55"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEHyslip2020816_55-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEHyslip2020816_55-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFHyslip2020">Hyslip 2020</a>, p. 816.</span> </li> <li id="cite_note-FOOTNOTEHyslip2020831–832-56"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEHyslip2020831–832_56-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFHyslip2020">Hyslip 2020</a>, pp. 831–832.</span> </li> <li id="cite_note-FOOTNOTEHyslip2020818-57"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEHyslip2020818_57-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFHyslip2020">Hyslip 2020</a>, p. 818.</span> </li> <li id="cite_note-FOOTNOTEHyslip2020820-58"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEHyslip2020820_58-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFHyslip2020">Hyslip 2020</a>, p. 820.</span> </li> <li id="cite_note-FOOTNOTEHyslip2020821-59"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEHyslip2020821_59-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFHyslip2020">Hyslip 2020</a>, p. 821.</span> </li> <li id="cite_note-FOOTNOTEHyslip2020822–823-60"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEHyslip2020822–823_60-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFHyslip2020">Hyslip 2020</a>, pp. 822–823.</span> </li> <li id="cite_note-FOOTNOTEHyslip2020828-829-61"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEHyslip2020828-829_61-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFHyslip2020">Hyslip 2020</a>, p. 828-829.</span> </li> <li id="cite_note-FOOTNOTEAgrafiotis_''et_al.''20187-62"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEAgrafiotis_''et_al.''20187_62-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFAgrafiotis_et_al.2018">Agrafiotis <i>et al.</i> 2018</a>, p. 7.</span> </li> <li id="cite_note-FOOTNOTEAgrafiotis_''et_al.''20189-63"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEAgrafiotis_''et_al.''20189_63-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEAgrafiotis_''et_al.''20189_63-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-FOOTNOTEAgrafiotis_''et_al.''20189_63-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFAgrafiotis_et_al.2018">Agrafiotis <i>et al.</i> 2018</a>, p. 9.</span> </li> <li id="cite_note-FOOTNOTEAgrafiotis_''et_al.''201810,_12-64"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEAgrafiotis_''et_al.''201810,_12_64-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFAgrafiotis_et_al.2018">Agrafiotis <i>et al.</i> 2018</a>, pp. 10, 12.</span> </li> <li id="cite_note-FOOTNOTEAgrafiotis_''et_al.''201810-65"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEAgrafiotis_''et_al.''201810_65-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFAgrafiotis_et_al.2018">Agrafiotis <i>et al.</i> 2018</a>, p. 10.</span> </li> <li id="cite_note-FOOTNOTEAgrafiotis_''et_al.''20187,_10-66"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEAgrafiotis_''et_al.''20187,_10_66-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFAgrafiotis_et_al.2018">Agrafiotis <i>et al.</i> 2018</a>, pp. 7, 10.</span> </li> <li id="cite_note-FOOTNOTECrawley202146-67"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTECrawley202146_67-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFCrawley2021">Crawley 2021</a>, p. 46.</span> </li> <li id="cite_note-FOOTNOTEFowler20167–8-68"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFowler20167–8_68-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFowler2016">Fowler 2016</a>, pp. 7–8.</span> </li> <li id="cite_note-FOOTNOTEFowler201613-69"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEFowler201613_69-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEFowler201613_69-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFFowler2016">Fowler 2016</a>, p. 13.</span> </li> <li id="cite_note-FOOTNOTEFowler20169–10-70"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFowler20169–10_70-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFowler2016">Fowler 2016</a>, pp. 9–10.</span> </li> <li id="cite_note-FOOTNOTEFowler201610–11-71"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFowler201610–11_71-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFowler2016">Fowler 2016</a>, pp. 10–11.</span> </li> <li id="cite_note-FOOTNOTEFowler201614-72"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFowler201614_72-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFowler2016">Fowler 2016</a>, p. 14.</span> </li> <li id="cite_note-FOOTNOTEFowler201613–14-73"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFowler201613–14_73-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFowler2016">Fowler 2016</a>, pp. 13–14.</span> </li> <li id="cite_note-FOOTNOTESloanWarner2019104-74"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTESloanWarner2019104_74-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFSloanWarner2019">Sloan & Warner 2019</a>, p. 104.</span> </li> <li id="cite_note-FOOTNOTELehto202236-75"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELehto202236_75-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLehto2022">Lehto 2022</a>, p. 36.</span> </li> <li id="cite_note-FOOTNOTEVähäkainuLehtoKariluoto2022285-76"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEVähäkainuLehtoKariluoto2022285_76-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFVähäkainuLehtoKariluoto2022">Vähäkainu, Lehto & Kariluoto 2022</a>, p. 285.</span> </li> <li id="cite_note-FOOTNOTEShandlerGomez2023359-77"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEShandlerGomez2023359_77-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEShandlerGomez2023359_77-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-FOOTNOTEShandlerGomez2023359_77-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFShandlerGomez2023">Shandler & Gomez 2023</a>, p. 359.</span> </li> <li id="cite_note-FOOTNOTELehto2022''passim''-78"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTELehto2022''passim''_78-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTELehto2022''passim''_78-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFLehto2022">Lehto 2022</a>, <i>passim</i>.</span> </li> <li id="cite_note-FOOTNOTEMakridis20211-79"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEMakridis20211_79-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFMakridis2021">Makridis 2021</a>, p. 1.</span> </li> <li id="cite_note-FOOTNOTEFowler201621-80"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFowler201621_80-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFowler2016">Fowler 2016</a>, p. 21.</span> </li> <li id="cite_note-FOOTNOTEAgrafiotis_''et_al.''20185-81"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEAgrafiotis_''et_al.''20185_81-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFAgrafiotis_et_al.2018">Agrafiotis <i>et al.</i> 2018</a>, p. 5.</span> </li> <li id="cite_note-FOOTNOTEMakridis20211,_7-82"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEMakridis20211,_7_82-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFMakridis2021">Makridis 2021</a>, pp. 1, 7.</span> </li> <li id="cite_note-FOOTNOTESloanWarner201964-83"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTESloanWarner201964_83-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFSloanWarner2019">Sloan & Warner 2019</a>, p. 64.</span> </li> <li id="cite_note-FOOTNOTETjoa_''et_al.''202492-84"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTETjoa_''et_al.''202492_84-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFTjoa_et_al.2024">Tjoa <i>et al.</i> 2024</a>, p. 92.</span> </li> <li id="cite_note-FOOTNOTEBareja202113,_16-85"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEBareja202113,_16_85-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFBareja2021">Bareja 2021</a>, pp. 13, 16.</span> </li> <li id="cite_note-FOOTNOTETjoa_''et_al.''202491–93-86"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTETjoa_''et_al.''202491–93_86-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFTjoa_et_al.2024">Tjoa <i>et al.</i> 2024</a>, pp. 91–93.</span> </li> <li id="cite_note-FOOTNOTEBareja202113–14-87"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEBareja202113–14_87-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFBareja2021">Bareja 2021</a>, pp. 13–14.</span> </li> <li id="cite_note-FOOTNOTETjoa_''et_al.''202494-88"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTETjoa_''et_al.''202494_88-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFTjoa_et_al.2024">Tjoa <i>et al.</i> 2024</a>, p. 94.</span> </li> <li id="cite_note-FOOTNOTEOppenheimer202439-89"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEOppenheimer202439_89-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEOppenheimer202439_89-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFOppenheimer2024">Oppenheimer 2024</a>, p. 39.</span> </li> <li id="cite_note-FOOTNOTETjoa_''et_al.''202495-90"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTETjoa_''et_al.''202495_90-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTETjoa_''et_al.''202495_90-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-FOOTNOTETjoa_''et_al.''202495_90-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFTjoa_et_al.2024">Tjoa <i>et al.</i> 2024</a>, p. 95.</span> </li> <li id="cite_note-FOOTNOTEFowler201681–82-91"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFowler201681–82_91-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFowler2016">Fowler 2016</a>, pp. 81–82.</span> </li> <li id="cite_note-FOOTNOTEFowler201683-92"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFowler201683_92-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFowler2016">Fowler 2016</a>, p. 83.</span> </li> <li id="cite_note-FOOTNOTEFowler2016120–122-93"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFowler2016120–122_93-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFowler2016">Fowler 2016</a>, pp. 120–122.</span> </li> <li id="cite_note-FOOTNOTEFowler2016115-94"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFowler2016115_94-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFowler2016">Fowler 2016</a>, p. 115.</span> </li> <li id="cite_note-FOOTNOTEFowler2016116-95"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFowler2016116_95-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFowler2016">Fowler 2016</a>, p. 116.</span> </li> <li id="cite_note-FOOTNOTEFowler2016117–118-96"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFowler2016117–118_96-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFowler2016">Fowler 2016</a>, pp. 117–118.</span> </li> <li id="cite_note-FOOTNOTEFowler2016124-97"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFowler2016124_97-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFowler2016">Fowler 2016</a>, p. 124.</span> </li> <li id="cite_note-FOOTNOTEFowler2016188-98"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFowler2016188_98-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFowler2016">Fowler 2016</a>, p. 188.</span> </li> <li id="cite_note-FOOTNOTESkopikPahi20201-99"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTESkopikPahi20201_99-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTESkopikPahi20201_99-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFSkopikPahi2020">Skopik & Pahi 2020</a>, p. 1.</span> </li> <li id="cite_note-FOOTNOTELiLiu20218177-100"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELiLiu20218177_100-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLiLiu2021">Li & Liu 2021</a>, p. 8177.</span> </li> <li id="cite_note-FOOTNOTESkopikPahi20201,_6-101"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTESkopikPahi20201,_6_101-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFSkopikPahi2020">Skopik & Pahi 2020</a>, pp. 1, 6.</span> </li> <li id="cite_note-FOOTNOTESkopikPahi202012-102"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTESkopikPahi202012_102-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFSkopikPahi2020">Skopik & Pahi 2020</a>, p. 12.</span> </li> <li id="cite_note-FOOTNOTESkopikPahi202016-103"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTESkopikPahi202016_103-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFSkopikPahi2020">Skopik & Pahi 2020</a>, p. 16.</span> </li> <li id="cite_note-FOOTNOTEFowler201644-104"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFowler201644_104-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFowler2016">Fowler 2016</a>, p. 44.</span> </li> <li id="cite_note-FOOTNOTESoloveHartzog202258-105"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTESoloveHartzog202258_105-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFSoloveHartzog2022">Solove & Hartzog 2022</a>, p. 58.</span> </li> <li id="cite_note-FOOTNOTEAravindakshan2021299-106"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEAravindakshan2021299_106-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEAravindakshan2021299_106-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFAravindakshan2021">Aravindakshan 2021</a>, p. 299.</span> </li> <li id="cite_note-FOOTNOTELilienthalAhmad2015399-107"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELilienthalAhmad2015399_107-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLilienthalAhmad2015">Lilienthal & Ahmad 2015</a>, p. 399.</span> </li> <li id="cite_note-Verbruggen-108"><span class="mw-cite-backlink">^ <a href="#cite_ref-Verbruggen_108-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Verbruggen_108-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFVerbruggen2024" class="citation news cs1">Verbruggen, Yola (10 January 2024). <a rel="nofollow" class="external text" href="https://www.ibanet.org/Cyberattacks-as-war-crimes">"Cyberattacks as war crimes"</a>. <a href="/wiki/International_Bar_Association" title="International Bar Association">International Bar Association</a><span class="reference-accessdate">. Retrieved <span class="nowrap">8 April</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyberattacks+as+war+crimes&rft.date=2024-01-10&rft.aulast=Verbruggen&rft.aufirst=Yola&rft_id=https%3A%2F%2Fwww.ibanet.org%2FCyberattacks-as-war-crimes&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTEAravindakshan2021298-109"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEAravindakshan2021298_109-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFAravindakshan2021">Aravindakshan 2021</a>, p. 298.</span> </li> <li id="cite_note-110"><span class="mw-cite-backlink"><b><a href="#cite_ref-110">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.unodc.org/e4j/zh/cybercrime/module-2/key-issues/offences-against-the-confidentiality--integrity-and-availability-of-computer-data-and-systems.html">"Key Issues: Offences against the confidentiality, integrity and availability of computer data and systems"</a>. <i>Cybercrime Module 2</i>. <a href="/wiki/United_Nations_Office_on_Drugs_and_Crime" title="United Nations Office on Drugs and Crime">United Nations Office on Drugs and Crime</a><span class="reference-accessdate">. Retrieved <span class="nowrap">8 April</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Cybercrime+Module+2&rft.atitle=Key+Issues%3A+Offences+against+the+confidentiality%2C+integrity+and+availability+of+computer+data+and+systems&rft_id=https%3A%2F%2Fwww.unodc.org%2Fe4j%2Fzh%2Fcybercrime%2Fmodule-2%2Fkey-issues%2Foffences-against-the-confidentiality--integrity-and-availability-of-computer-data-and-systems.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTEAravindakshan2021296-111"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEAravindakshan2021296_111-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFAravindakshan2021">Aravindakshan 2021</a>, p. 296.</span> </li> <li id="cite_note-112"><span class="mw-cite-backlink"><b><a href="#cite_ref-112">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWilkinson2023" class="citation news cs1">Wilkinson, Isabella (2 August 2023). <a rel="nofollow" class="external text" href="https://www.chathamhouse.org/2023/08/what-un-cybercrime-treaty-and-why-does-it-matter">"What is the UN cybercrime treaty and why does it matter?"</a>. <i><a href="/wiki/Chatham_House" title="Chatham House">Chatham House</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">8 April</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Chatham+House&rft.atitle=What+is+the+UN+cybercrime+treaty+and+why+does+it+matter%3F&rft.date=2023-08-02&rft.aulast=Wilkinson&rft.aufirst=Isabella&rft_id=https%3A%2F%2Fwww.chathamhouse.org%2F2023%2F08%2Fwhat-un-cybercrime-treaty-and-why-does-it-matter&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTESoloveHartzog202210-113"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTESoloveHartzog202210_113-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFSoloveHartzog2022">Solove & Hartzog 2022</a>, p. 10.</span> </li> </ol></div></div> <div class="mw-heading mw-heading2"><h2 id="Sources">Sources</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cyberattack&action=edit&section=20" title="Edit section: Sources"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239549316">.mw-parser-output .refbegin{margin-bottom:0.5em}.mw-parser-output .refbegin-hanging-indents>ul{margin-left:0}.mw-parser-output .refbegin-hanging-indents>ul>li{margin-left:0;padding-left:3.2em;text-indent:-3.2em}.mw-parser-output .refbegin-hanging-indents ul,.mw-parser-output .refbegin-hanging-indents ul li{list-style:none}@media(max-width:720px){.mw-parser-output .refbegin-hanging-indents>ul>li{padding-left:1.6em;text-indent:-1.6em}}.mw-parser-output .refbegin-columns{margin-top:0.3em}.mw-parser-output .refbegin-columns ul{margin-top:0}.mw-parser-output .refbegin-columns li{page-break-inside:avoid;break-inside:avoid-column}@media screen{.mw-parser-output .refbegin{font-size:90%}}</style><div class="refbegin refbegin-hanging-indents" style=""> <ul><li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAblonBogart2017" class="citation book cs1">Ablon, Lillian; Bogart, Andy (2017). <a rel="nofollow" class="external text" href="https://www.rand.org/content/dam/rand/pubs/research_reports/RR1700/RR1751/RAND_RR1751.pdf"><i>Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits</i></a> <span class="cs1-format">(PDF)</span>. Rand Corporation. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-8330-9761-3" title="Special:BookSources/978-0-8330-9761-3"><bdi>978-0-8330-9761-3</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Zero+Days%2C+Thousands+of+Nights%3A+The+Life+and+Times+of+Zero-Day+Vulnerabilities+and+Their+Exploits&rft.pub=Rand+Corporation&rft.date=2017&rft.isbn=978-0-8330-9761-3&rft.aulast=Ablon&rft.aufirst=Lillian&rft.au=Bogart%2C+Andy&rft_id=https%3A%2F%2Fwww.rand.org%2Fcontent%2Fdam%2Frand%2Fpubs%2Fresearch_reports%2FRR1700%2FRR1751%2FRAND_RR1751.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAl-TurjmanSalama2020" class="citation book cs1">Al-Turjman, Fadi; Salama, Ramiz (2020). "An Overview about the Cyberattacks in Grid and Like Systems". <i>Smart Grid in IoT-Enabled Spaces</i>. CRC Press. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-003-05523-5" title="Special:BookSources/978-1-003-05523-5"><bdi>978-1-003-05523-5</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=An+Overview+about+the+Cyberattacks+in+Grid+and+Like+Systems&rft.btitle=Smart+Grid+in+IoT-Enabled+Spaces&rft.pub=CRC+Press&rft.date=2020&rft.isbn=978-1-003-05523-5&rft.aulast=Al-Turjman&rft.aufirst=Fadi&rft.au=Salama%2C+Ramiz&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAgrafiotis_et_al.2018" class="citation journal cs1">Agrafiotis, Ioannis; Nurse, Jason R C; Goldsmith, Michael; Creese, Sadie; Upton, David (2018). "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate". <i>Journal of Cybersecurity</i>. <b>4</b> (1). <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1093%2Fcybsec%2Ftyy006">10.1093/cybsec/tyy006</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2057-2085">2057-2085</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Journal+of+Cybersecurity&rft.atitle=A+taxonomy+of+cyber-harms%3A+Defining+the+impacts+of+cyber-attacks+and+understanding+how+they+propagate&rft.volume=4&rft.issue=1&rft.date=2018&rft_id=info%3Adoi%2F10.1093%2Fcybsec%2Ftyy006&rft.issn=2057-2085&rft.aulast=Agrafiotis&rft.aufirst=Ioannis&rft.au=Nurse%2C+Jason+R+C&rft.au=Goldsmith%2C+Michael&rft.au=Creese%2C+Sadie&rft.au=Upton%2C+David&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAsbaşTuzlukaya2022" class="citation book cs1">Asbaş, C.; Tuzlukaya, Ş. (2022). <a rel="nofollow" class="external text" href="https://www.emerald.com/insight/content/doi/10.1108/978-1-80262-773-220221027/full/html">"Cyberattack and Cyberwarfare Strategies for Businesses"</a>. <i>Conflict Management in Digital Business: New Strategy and Approach</i>. Emerald Group Publishing. pp. <span class="nowrap">303–</span>328. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1108%2F978-1-80262-773-220221027">10.1108/978-1-80262-773-220221027</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-80262-773-2" title="Special:BookSources/978-1-80262-773-2"><bdi>978-1-80262-773-2</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Cyberattack+and+Cyberwarfare+Strategies+for+Businesses&rft.btitle=Conflict+Management+in+Digital+Business%3A+New+Strategy+and+Approach&rft.pages=%3Cspan+class%3D%22nowrap%22%3E303-%3C%2Fspan%3E328&rft.pub=Emerald+Group+Publishing&rft.date=2022&rft_id=info%3Adoi%2F10.1108%2F978-1-80262-773-220221027&rft.isbn=978-1-80262-773-2&rft.aulast=Asba%C5%9F&rft.aufirst=C.&rft.au=Tuzlukaya%2C+%C5%9E.&rft_id=https%3A%2F%2Fwww.emerald.com%2Finsight%2Fcontent%2Fdoi%2F10.1108%2F978-1-80262-773-220221027%2Ffull%2Fhtml&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAravindakshan2021" class="citation journal cs1">Aravindakshan, Sharngan (2021). "Cyberattacks: a look at evidentiary thresholds in International Law". <i>Indian Journal of International Law</i>. <b>59</b> (<span class="nowrap">1–</span>4): <span class="nowrap">285–</span>299. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2Fs40901-020-00113-0">10.1007/s40901-020-00113-0</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Indian+Journal+of+International+Law&rft.atitle=Cyberattacks%3A+a+look+at+evidentiary+thresholds+in+International+Law&rft.volume=59&rft.issue=%3Cspan+class%3D%22nowrap%22%3E1%E2%80%93%3C%2Fspan%3E4&rft.pages=%3Cspan+class%3D%22nowrap%22%3E285-%3C%2Fspan%3E299&rft.date=2021&rft_id=info%3Adoi%2F10.1007%2Fs40901-020-00113-0&rft.aulast=Aravindakshan&rft.aufirst=Sharngan&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBareja2021" class="citation book cs1">Bareja, Dinesh O. (2021). "By Failing to Prepare, You Are Preparing to Fail". <i>Security Incidents & Response Against Cyber Attacks</i>. Springer International Publishing. pp. <span class="nowrap">13–</span>29. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-3-030-69174-5" title="Special:BookSources/978-3-030-69174-5"><bdi>978-3-030-69174-5</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=By+Failing+to+Prepare%2C+You+Are+Preparing+to+Fail&rft.btitle=Security+Incidents+%26+Response+Against+Cyber+Attacks&rft.pages=%3Cspan+class%3D%22nowrap%22%3E13-%3C%2Fspan%3E29&rft.pub=Springer+International+Publishing&rft.date=2021&rft.isbn=978-3-030-69174-5&rft.aulast=Bareja&rft.aufirst=Dinesh+O.&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCrawley2021" class="citation book cs1">Crawley, Kim (2021). <i>8 Steps to Better Security: A Simple Cyber Resilience Guide for Business</i>. John Wiley & Sons. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-119-81124-4" title="Special:BookSources/978-1-119-81124-4"><bdi>978-1-119-81124-4</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=8+Steps+to+Better+Security%3A+A+Simple+Cyber+Resilience+Guide+for+Business&rft.pub=John+Wiley+%26+Sons&rft.date=2021&rft.isbn=978-1-119-81124-4&rft.aulast=Crawley&rft.aufirst=Kim&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDaswaniElbayadi2021" class="citation book cs1"><a href="/wiki/Neil_Daswani" title="Neil Daswani">Daswani, Neil</a>; Elbayadi, Moudy (2021). <i>Big Breaches: Cybersecurity Lessons for Everyone</i>. Apress. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-4842-6654-0" title="Special:BookSources/978-1-4842-6654-0"><bdi>978-1-4842-6654-0</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Big+Breaches%3A+Cybersecurity+Lessons+for+Everyone&rft.pub=Apress&rft.date=2021&rft.isbn=978-1-4842-6654-0&rft.aulast=Daswani&rft.aufirst=Neil&rft.au=Elbayadi%2C+Moudy&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFowler2016" class="citation book cs1">Fowler, Kevvie (2016). <i>Data Breach Preparation and Response: Breaches are Certain, Impact is Not</i>. Elsevier Science. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-12-803451-4" title="Special:BookSources/978-0-12-803451-4"><bdi>978-0-12-803451-4</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Data+Breach+Preparation+and+Response%3A+Breaches+are+Certain%2C+Impact+is+Not&rft.pub=Elsevier+Science&rft.date=2016&rft.isbn=978-0-12-803451-4&rft.aulast=Fowler&rft.aufirst=Kevvie&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHaberHibbert2018" class="citation book cs1">Haber, Morey J.; Hibbert, Brad (2018). <i>Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations</i>. Apress. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-4842-3627-7" title="Special:BookSources/978-1-4842-3627-7"><bdi>978-1-4842-3627-7</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Asset+Attack+Vectors%3A+Building+Effective+Vulnerability+Management+Strategies+to+Protect+Organizations&rft.pub=Apress&rft.date=2018&rft.isbn=978-1-4842-3627-7&rft.aulast=Haber&rft.aufirst=Morey+J.&rft.au=Hibbert%2C+Brad&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHyslip2020" class="citation book cs1">Hyslip, Thomas S. (2020). "Cybercrime-as-a-Service Operations". <i>The Palgrave Handbook of International Cybercrime and Cyberdeviance</i>. Springer International Publishing. pp. <span class="nowrap">815–</span>846. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-3-319-78440-3" title="Special:BookSources/978-3-319-78440-3"><bdi>978-3-319-78440-3</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Cybercrime-as-a-Service+Operations&rft.btitle=The+Palgrave+Handbook+of+International+Cybercrime+and+Cyberdeviance&rft.pages=%3Cspan+class%3D%22nowrap%22%3E815-%3C%2Fspan%3E846&rft.pub=Springer+International+Publishing&rft.date=2020&rft.isbn=978-3-319-78440-3&rft.aulast=Hyslip&rft.aufirst=Thomas+S.&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLehto2022" class="citation book cs1">Lehto, Martti (2022). "Cyber-Attacks Against Critical Infrastructure". <i>Cyber Security: Critical Infrastructure Protection</i>. Springer International Publishing. pp. <span class="nowrap">3–</span>42. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-3-030-91293-2" title="Special:BookSources/978-3-030-91293-2"><bdi>978-3-030-91293-2</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Cyber-Attacks+Against+Critical+Infrastructure&rft.btitle=Cyber+Security%3A+Critical+Infrastructure+Protection&rft.pages=%3Cspan+class%3D%22nowrap%22%3E3-%3C%2Fspan%3E42&rft.pub=Springer+International+Publishing&rft.date=2022&rft.isbn=978-3-030-91293-2&rft.aulast=Lehto&rft.aufirst=Martti&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLiLiu2021" class="citation journal cs1">Li, Yuchong; Liu, Qinghui (2021). <a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.egyr.2021.08.126">"A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments"</a>. <i>Energy Reports</i>. <b>7</b>: <span class="nowrap">8176–</span>8186. <a href="/wiki/Bibcode_(identifier)" class="mw-redirect" title="Bibcode (identifier)">Bibcode</a>:<a rel="nofollow" class="external text" href="https://ui.adsabs.harvard.edu/abs/2021EnRep...7.8176L">2021EnRep...7.8176L</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.egyr.2021.08.126">10.1016/j.egyr.2021.08.126</a></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Energy+Reports&rft.atitle=A+comprehensive+review+study+of+cyber-attacks+and+cyber+security%3B+Emerging+trends+and+recent+developments&rft.volume=7&rft.pages=%3Cspan+class%3D%22nowrap%22%3E8176-%3C%2Fspan%3E8186&rft.date=2021&rft_id=info%3Adoi%2F10.1016%2Fj.egyr.2021.08.126&rft_id=info%3Abibcode%2F2021EnRep...7.8176L&rft.aulast=Li&rft.aufirst=Yuchong&rft.au=Liu%2C+Qinghui&rft_id=https%3A%2F%2Fdoi.org%2F10.1016%252Fj.egyr.2021.08.126&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLibickiAblonWebb2015" class="citation book cs1">Libicki, Martin C.; Ablon, Lillian; Webb, Tim (2015). <a rel="nofollow" class="external text" href="https://www.rand.org/content/dam/rand/pubs/research_reports/RR1000/RR1024/RAND_RR1024.pdf"><i>The Defender's Dilemma: Charting a Course Toward Cybersecurity</i></a> <span class="cs1-format">(PDF)</span>. Rand Corporation. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-8330-8911-3" title="Special:BookSources/978-0-8330-8911-3"><bdi>978-0-8330-8911-3</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Defender%27s+Dilemma%3A+Charting+a+Course+Toward+Cybersecurity&rft.pub=Rand+Corporation&rft.date=2015&rft.isbn=978-0-8330-8911-3&rft.aulast=Libicki&rft.aufirst=Martin+C.&rft.au=Ablon%2C+Lillian&rft.au=Webb%2C+Tim&rft_id=https%3A%2F%2Fwww.rand.org%2Fcontent%2Fdam%2Frand%2Fpubs%2Fresearch_reports%2FRR1000%2FRR1024%2FRAND_RR1024.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLinkovKott2019" class="citation book cs1">Linkov, Igor; Kott, Alexander (2019). "Fundamental Concepts of Cyber Resilience: Introduction and Overview". <i>Cyber Resilience of Systems and Networks</i>. Springer International Publishing. pp. <span class="nowrap">1–</span>25. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-3-319-77492-3" title="Special:BookSources/978-3-319-77492-3"><bdi>978-3-319-77492-3</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Fundamental+Concepts+of+Cyber+Resilience%3A+Introduction+and+Overview&rft.btitle=Cyber+Resilience+of+Systems+and+Networks&rft.pages=%3Cspan+class%3D%22nowrap%22%3E1-%3C%2Fspan%3E25&rft.pub=Springer+International+Publishing&rft.date=2019&rft.isbn=978-3-319-77492-3&rft.aulast=Linkov&rft.aufirst=Igor&rft.au=Kott%2C+Alexander&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLilienthalAhmad2015" class="citation journal cs1">Lilienthal, Gary; Ahmad, Nehaluddin (2015). "Cyber-attack as inevitable kinetic war". <i>Computer Law & Security Review</i>. <b>31</b> (3): <span class="nowrap">390–</span>400. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.clsr.2015.03.002">10.1016/j.clsr.2015.03.002</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Computer+Law+%26+Security+Review&rft.atitle=Cyber-attack+as+inevitable+kinetic+war&rft.volume=31&rft.issue=3&rft.pages=%3Cspan+class%3D%22nowrap%22%3E390-%3C%2Fspan%3E400&rft.date=2015&rft_id=info%3Adoi%2F10.1016%2Fj.clsr.2015.03.002&rft.aulast=Lilienthal&rft.aufirst=Gary&rft.au=Ahmad%2C+Nehaluddin&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMakridis2021" class="citation journal cs1">Makridis, Christos A (2021). <a rel="nofollow" class="external text" href="https://doi.org/10.1093%2Fcybsec%2Ftyab021">"Do data breaches damage reputation? Evidence from 45 companies between 2002 and 2018"</a>. <i>Journal of Cybersecurity</i>. <b>7</b> (1). <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1093%2Fcybsec%2Ftyab021">10.1093/cybsec/tyab021</a></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Journal+of+Cybersecurity&rft.atitle=Do+data+breaches+damage+reputation%3F+Evidence+from+45+companies+between+2002+and+2018&rft.volume=7&rft.issue=1&rft.date=2021&rft_id=info%3Adoi%2F10.1093%2Fcybsec%2Ftyab021&rft.aulast=Makridis&rft.aufirst=Christos+A&rft_id=https%3A%2F%2Fdoi.org%2F10.1093%252Fcybsec%252Ftyab021&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFOppenheimer2024" class="citation journal cs1">Oppenheimer, Harry (2024). <a rel="nofollow" class="external text" href="https://doi.org/10.1177%2F00223433231217687">"How the process of discovering cyberattacks biases our understanding of cybersecurity"</a>. <i>Journal of Peace Research</i>. <b>61</b> (1): <span class="nowrap">28–</span>43. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1177%2F00223433231217687">10.1177/00223433231217687</a></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Journal+of+Peace+Research&rft.atitle=How+the+process+of+discovering+cyberattacks+biases+our+understanding+of+cybersecurity&rft.volume=61&rft.issue=1&rft.pages=%3Cspan+class%3D%22nowrap%22%3E28-%3C%2Fspan%3E43&rft.date=2024&rft_id=info%3Adoi%2F10.1177%2F00223433231217687&rft.aulast=Oppenheimer&rft.aufirst=Harry&rft_id=https%3A%2F%2Fdoi.org%2F10.1177%252F00223433231217687&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPerlroth2021" class="citation book cs1">Perlroth, Nicole (2021). <i>This Is How They Tell Me the World Ends: Winner of the FT & McKinsey Business Book of the Year Award 2021</i>. Bloomsbury Publishing. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-5266-2983-8" title="Special:BookSources/978-1-5266-2983-8"><bdi>978-1-5266-2983-8</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=This+Is+How+They+Tell+Me+the+World+Ends%3A+Winner+of+the+FT+%26+McKinsey+Business+Book+of+the+Year+Award+2021&rft.pub=Bloomsbury+Publishing&rft.date=2021&rft.isbn=978-1-5266-2983-8&rft.aulast=Perlroth&rft.aufirst=Nicole&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSeaman2020" class="citation book cs1">Seaman, Jim (2020). <i>PCI DSS: An Integrated Data Security Standard Guide</i>. Apress. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-4842-5808-8" title="Special:BookSources/978-1-4842-5808-8"><bdi>978-1-4842-5808-8</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=PCI+DSS%3A+An+Integrated+Data+Security+Standard+Guide&rft.pub=Apress&rft.date=2020&rft.isbn=978-1-4842-5808-8&rft.aulast=Seaman&rft.aufirst=Jim&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFShandlerGomez2023" class="citation journal cs1">Shandler, Ryan; Gomez, Miguel Alberto (2023). "The hidden threat of cyber-attacks – undermining public confidence in government". <i>Journal of Information Technology & Politics</i>. <b>20</b> (4): <span class="nowrap">359–</span>374. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F19331681.2022.2112796">10.1080/19331681.2022.2112796</a>. <a href="/wiki/Hdl_(identifier)" class="mw-redirect" title="Hdl (identifier)">hdl</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://hdl.handle.net/20.500.11850%2F566953">20.500.11850/566953</a></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Journal+of+Information+Technology+%26+Politics&rft.atitle=The+hidden+threat+of+cyber-attacks+%E2%80%93+undermining+public+confidence+in+government&rft.volume=20&rft.issue=4&rft.pages=%3Cspan+class%3D%22nowrap%22%3E359-%3C%2Fspan%3E374&rft.date=2023&rft_id=info%3Ahdl%2F20.500.11850%2F566953&rft_id=info%3Adoi%2F10.1080%2F19331681.2022.2112796&rft.aulast=Shandler&rft.aufirst=Ryan&rft.au=Gomez%2C+Miguel+Alberto&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSkopikPahi2020" class="citation journal cs1">Skopik, Florian; Pahi, Timea (2020). <a rel="nofollow" class="external text" href="https://doi.org/10.1186%2Fs42400-020-00048-4">"Under false flag: using technical artifacts for cyber attack attribution"</a>. <i>Cybersecurity</i>. <b>3</b> (1): 8. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1186%2Fs42400-020-00048-4">10.1186/s42400-020-00048-4</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2523-3246">2523-3246</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Cybersecurity&rft.atitle=Under+false+flag%3A+using+technical+artifacts+for+cyber+attack+attribution&rft.volume=3&rft.issue=1&rft.pages=8&rft.date=2020&rft_id=info%3Adoi%2F10.1186%2Fs42400-020-00048-4&rft.issn=2523-3246&rft.aulast=Skopik&rft.aufirst=Florian&rft.au=Pahi%2C+Timea&rft_id=https%3A%2F%2Fdoi.org%2F10.1186%252Fs42400-020-00048-4&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSloanWarner2019" class="citation book cs1">Sloan, Robert H.; Warner, Richard (2019). <i>Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy</i>. CRC Press. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-351-12729-5" title="Special:BookSources/978-1-351-12729-5"><bdi>978-1-351-12729-5</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Why+Don%27t+We+Defend+Better%3F%3A+Data+Breaches%2C+Risk+Management%2C+and+Public+Policy&rft.pub=CRC+Press&rft.date=2019&rft.isbn=978-1-351-12729-5&rft.aulast=Sloan&rft.aufirst=Robert+H.&rft.au=Warner%2C+Richard&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSoloveHartzog2022" class="citation book cs1"><a href="/wiki/Daniel_J._Solove" title="Daniel J. Solove">Solove, Daniel J.</a>; Hartzog, Woodrow (2022). <i>Breached!: Why Data Security Law Fails and How to Improve it</i>. Oxford University Press. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-19-094057-7" title="Special:BookSources/978-0-19-094057-7"><bdi>978-0-19-094057-7</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Breached%21%3A+Why+Data+Security+Law+Fails+and+How+to+Improve+it&rft.pub=Oxford+University+Press&rft.date=2022&rft.isbn=978-0-19-094057-7&rft.aulast=Solove&rft.aufirst=Daniel+J.&rft.au=Hartzog%2C+Woodrow&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSoodEnbody2014" class="citation book cs1">Sood, Aditya; Enbody, Richard (2014). <i>Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware</i>. Syngress. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-12-800619-1" title="Special:BookSources/978-0-12-800619-1"><bdi>978-0-12-800619-1</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Targeted+Cyber+Attacks%3A+Multi-staged+Attacks+Driven+by+Exploits+and+Malware&rft.pub=Syngress&rft.date=2014&rft.isbn=978-0-12-800619-1&rft.aulast=Sood&rft.aufirst=Aditya&rft.au=Enbody%2C+Richard&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFTjoa_et_al.2024" class="citation book cs1">Tjoa, Simon; Gafić, Melisa; Kieseberg, Peter (2024). <i>Cyber Resilience Fundamentals</i>. Springer Nature. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-3-031-52064-8" title="Special:BookSources/978-3-031-52064-8"><bdi>978-3-031-52064-8</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Cyber+Resilience+Fundamentals&rft.pub=Springer+Nature&rft.date=2024&rft.isbn=978-3-031-52064-8&rft.aulast=Tjoa&rft.aufirst=Simon&rft.au=Gafi%C4%87%2C+Melisa&rft.au=Kieseberg%2C+Peter&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFVähäkainuLehtoKariluoto2022" class="citation book cs1">Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (2022). "Cyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures". <i>Cyber Security: Critical Infrastructure Protection</i>. Springer International Publishing. pp. <span class="nowrap">255–</span>292. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-3-030-91293-2" title="Special:BookSources/978-3-030-91293-2"><bdi>978-3-030-91293-2</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Cyberattacks+Against+Critical+Infrastructure+Facilities+and+Corresponding+Countermeasures&rft.btitle=Cyber+Security%3A+Critical+Infrastructure+Protection&rft.pages=%3Cspan+class%3D%22nowrap%22%3E255-%3C%2Fspan%3E292&rft.pub=Springer+International+Publishing&rft.date=2022&rft.isbn=978-3-030-91293-2&rft.aulast=V%C3%A4h%C3%A4kainu&rft.aufirst=Petri&rft.au=Lehto%2C+Martti&rft.au=Kariluoto%2C+Antti&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACyberattack" class="Z3988"></span></li></ul> </div> <div class="navbox-styles"><style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style></div><div role="navigation" class="navbox" aria-labelledby="Global_catastrophic_risks750" style="padding:3px"><table class="nowraplinks hlist mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Global_catastrophic_risks" title="Template:Global catastrophic risks"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Global_catastrophic_risks" title="Template talk:Global catastrophic risks"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Global_catastrophic_risks" title="Special:EditPage/Template:Global catastrophic risks"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Global_catastrophic_risks750" style="font-size:114%;margin:0 4em"><a href="/wiki/Global_catastrophic_risk" title="Global catastrophic risk">Global catastrophic risks</a></div></th></tr><tr><td class="navbox-abovebelow" colspan="2"><div> <ul><li><a href="/wiki/Future_of_Earth" title="Future of Earth">Future of the Earth</a></li> <li><a href="/wiki/Future_of_an_expanding_universe" title="Future of an expanding universe">Future of an expanding universe</a> <ul><li><a href="/wiki/Ultimate_fate_of_the_universe" title="Ultimate fate of the universe">Ultimate fate of the universe</a></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Technological</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Chemical_warfare" title="Chemical warfare">Chemical warfare</a></li> <li><a class="mw-selflink selflink">Cyberattack</a> <ul><li><a href="/wiki/Cyberwarfare" title="Cyberwarfare">Cyberwarfare</a></li> <li><a href="/wiki/Cyberterrorism" title="Cyberterrorism">Cyberterrorism</a></li> <li><a href="/wiki/Cybergeddon" title="Cybergeddon">Cybergeddon</a></li></ul></li> <li><a href="/wiki/Gray_goo" title="Gray goo">Gray goo</a></li> <li><a href="/wiki/Industrial_applications_of_nanotechnology#Weapons" title="Industrial applications of nanotechnology">Nanoweapons</a></li> <li><a href="/wiki/Kinetic_bombardment" title="Kinetic bombardment">Kinetic bombardment</a> <ul><li><a href="/wiki/Kinetic_energy_weapon" title="Kinetic energy weapon">Kinetic energy weapon</a></li></ul></li> <li><a href="/wiki/Nuclear_warfare" title="Nuclear warfare">Nuclear warfare</a> <ul><li><a href="/wiki/Mutual_assured_destruction" title="Mutual assured destruction">Mutual assured destruction</a></li> <li><a href="/wiki/Dead_Hand" title="Dead Hand">Dead Hand</a></li> <li><a href="/wiki/Doomsday_Clock" title="Doomsday Clock">Doomsday Clock</a></li> <li><a href="/wiki/Doomsday_device" title="Doomsday device">Doomsday device</a></li> <li><a href="/wiki/Antimatter_weapon" title="Antimatter weapon">Antimatter weapon</a></li></ul></li> <li><a href="/wiki/Electromagnetic_pulse" title="Electromagnetic pulse">Electromagnetic pulse</a> (EMP)</li> <li><a href="/wiki/Safety_of_high-energy_particle_collision_experiments" title="Safety of high-energy particle collision experiments">Safety of high-energy particle collision experiments</a> <ul><li><a href="/wiki/Micro_black_hole" title="Micro black hole">Micro black hole</a></li> <li><a href="/wiki/Strangelet" title="Strangelet">Strangelet</a></li></ul></li> <li><a href="/wiki/Synthetic_intelligence" title="Synthetic intelligence">Synthetic intelligence</a> / <a href="/wiki/Artificial_intelligence" title="Artificial intelligence">Artificial intelligence</a> <ul><li><a href="/wiki/AI_takeover" title="AI takeover">AI takeover</a></li> <li><a href="/wiki/Existential_risk_from_artificial_general_intelligence" class="mw-redirect" title="Existential risk from artificial general intelligence">Existential risk from artificial intelligence</a></li> <li><a href="/wiki/Technological_singularity" title="Technological singularity">Technological singularity</a></li></ul></li> <li><a href="/wiki/Transhumanism" title="Transhumanism">Transhumanism</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Sociological</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Anthropogenic_hazard" class="mw-redirect" title="Anthropogenic hazard">Anthropogenic hazard</a></li> <li><a href="/wiki/Collapsology" title="Collapsology">Collapsology</a></li> <li><a href="/wiki/Doomsday_argument" title="Doomsday argument">Doomsday argument</a> <ul><li><a href="/wiki/Self-indication_assumption_doomsday_argument_rebuttal" title="Self-indication assumption doomsday argument rebuttal">Self-indication assumption doomsday argument rebuttal</a></li> <li><a href="/wiki/Self-referencing_doomsday_argument_rebuttal" title="Self-referencing doomsday argument rebuttal">Self-referencing doomsday argument rebuttal</a></li></ul></li> <li><a href="/wiki/Economic_collapse" title="Economic collapse">Economic collapse</a></li> <li><a href="/wiki/Malthusianism" title="Malthusianism">Malthusian catastrophe</a></li> <li><a href="/wiki/New_World_Order_(conspiracy_theory)" class="mw-redirect" title="New World Order (conspiracy theory)">New World Order (conspiracy theory)</a></li> <li><a href="/wiki/Nuclear_holocaust" title="Nuclear holocaust">Nuclear holocaust</a> <ul><li><a href="/wiki/Cobalt_bomb" title="Cobalt bomb">cobalt</a></li> <li><a href="/wiki/Nuclear_famine" title="Nuclear famine">famine</a></li> <li><a href="/wiki/Nuclear_winter" title="Nuclear winter">winter</a></li></ul></li> <li><a href="/wiki/Societal_collapse" title="Societal collapse">Societal collapse</a></li> <li><a href="/wiki/State_collapse" title="State collapse">State collapse</a></li> <li><a href="/wiki/World_War_III" title="World War III">World War III</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Climate_apocalypse" title="Climate apocalypse">Ecological</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Climate_variability_and_change" title="Climate variability and change">Climate change</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Anoxic_event" title="Anoxic event">Anoxic event</a></li> <li><a href="/wiki/Biodiversity_loss" title="Biodiversity loss">Biodiversity loss</a> <ul><li><a href="/wiki/Mass_mortality_event" title="Mass mortality event">Mass mortality event</a></li></ul></li> <li><a href="/wiki/Cascade_effect_(ecology)" title="Cascade effect (ecology)">Cascade effect</a></li> <li><a href="/wiki/Cataclysmic_pole_shift_hypothesis" title="Cataclysmic pole shift hypothesis">Cataclysmic pole shift hypothesis</a></li> <li><a href="/wiki/Climate_change_and_civilizational_collapse" title="Climate change and civilizational collapse">Climate change and civilizational collapse</a></li> <li><a href="/wiki/Deforestation" title="Deforestation">Deforestation</a></li> <li><a href="/wiki/Desertification" title="Desertification">Desertification</a></li> <li><a href="/wiki/Extinction_risk_from_climate_change" title="Extinction risk from climate change">Extinction risk from climate change</a> <ul><li><a href="/wiki/Tipping_points_in_the_climate_system" title="Tipping points in the climate system">Tipping points in the climate system</a></li></ul></li> <li><a href="/wiki/Flood_basalt" title="Flood basalt">Flood basalt</a></li> <li><a href="/wiki/Global_dimming" title="Global dimming">Global dimming</a></li> <li><a href="/wiki/Global_terrestrial_stilling" title="Global terrestrial stilling">Global terrestrial stilling</a></li> <li><a href="/wiki/Climate_change" title="Climate change">Global warming</a></li> <li><a href="/wiki/Hypercane" title="Hypercane">Hypercane</a></li> <li><a href="/wiki/Ice_age" title="Ice age">Ice age</a></li> <li><a href="/wiki/Ecocide" title="Ecocide">Ecocide</a></li> <li><a href="/wiki/Ecological_collapse" class="mw-redirect" title="Ecological collapse">Ecological collapse</a></li> <li><a href="/wiki/Environmental_degradation" title="Environmental degradation">Environmental degradation</a></li> <li><a href="/wiki/Habitat_destruction" title="Habitat destruction">Habitat destruction</a></li> <li><a href="/wiki/Human_impact_on_the_environment" title="Human impact on the environment">Human impact on the environment</a> <ul><li><a href="/wiki/Environmental_issues_with_coral_reefs" title="Environmental issues with coral reefs">coral reefs</a></li> <li><a href="/wiki/Human_impact_on_marine_life" title="Human impact on marine life">on marine life</a></li></ul></li> <li><a href="/wiki/Land_degradation" title="Land degradation">Land degradation</a></li> <li><a href="/wiki/Land_consumption" title="Land consumption">Land consumption</a></li> <li><a href="/wiki/Land_surface_effects_on_climate" title="Land surface effects on climate">Land surface effects on climate</a></li> <li><a href="/wiki/Ocean_acidification" title="Ocean acidification">Ocean acidification</a></li> <li><a href="/wiki/Ozone_depletion" title="Ozone depletion">Ozone depletion</a></li> <li><a href="/wiki/Resource_depletion" title="Resource depletion">Resource depletion</a></li> <li><a href="/wiki/Sea_level_rise" title="Sea level rise">Sea level rise</a></li> <li><a href="/wiki/Supervolcano" title="Supervolcano">Supervolcano</a> <ul><li><a href="/wiki/Volcanic_winter" title="Volcanic winter">winter</a></li></ul></li> <li><a href="/wiki/Verneshot" title="Verneshot">Verneshot</a></li> <li><a href="/wiki/Water_pollution" title="Water pollution">Water pollution</a></li> <li><a href="/wiki/Water_scarcity" title="Water scarcity">Water scarcity</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Earth_Overshoot_Day" title="Earth Overshoot Day">Earth Overshoot Day</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Overexploitation" title="Overexploitation">Overexploitation</a></li> <li><a href="/wiki/Overpopulation" title="Overpopulation">Overpopulation</a> <ul><li><a href="/wiki/Human_overpopulation" title="Human overpopulation">Human overpopulation</a></li></ul></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Biological</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Extinction" title="Extinction">Extinction</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Extinction_event" title="Extinction event">Extinction event</a></li> <li><a href="/wiki/Holocene_extinction" title="Holocene extinction">Holocene extinction</a></li> <li><a href="/wiki/Human_extinction" title="Human extinction">Human extinction</a></li> <li><a href="/wiki/List_of_extinction_events" title="List of extinction events">List of extinction events</a></li> <li><a href="/wiki/Genetic_erosion" title="Genetic erosion">Genetic erosion</a></li> <li><a href="/wiki/Genetic_pollution" title="Genetic pollution">Genetic pollution</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Others</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Biodiversity_loss" title="Biodiversity loss">Biodiversity loss</a> <ul><li><a href="/wiki/Decline_in_amphibian_populations" title="Decline in amphibian populations">Decline in amphibian populations</a></li> <li><a href="/wiki/Decline_in_insect_populations" title="Decline in insect populations">Decline in insect populations</a></li></ul></li> <li><a href="/wiki/Biotechnology_risk" title="Biotechnology risk">Biotechnology risk</a> <ul><li><a href="/wiki/Biological_agent" title="Biological agent">Biological agent</a></li> <li><a href="/wiki/Biological_warfare" title="Biological warfare">Biological warfare</a></li> <li><a href="/wiki/Bioterrorism" title="Bioterrorism">Bioterrorism</a></li></ul></li> <li><a href="/wiki/Colony_collapse_disorder" title="Colony collapse disorder">Colony collapse disorder</a></li> <li><a href="/wiki/Defaunation" title="Defaunation">Defaunation</a></li> <li><a href="/wiki/Dysgenics" title="Dysgenics">Dysgenics</a></li> <li><a href="/wiki/Interplanetary_contamination" title="Interplanetary contamination">Interplanetary contamination</a></li> <li><a href="/wiki/Pandemic" title="Pandemic">Pandemic</a></li> <li><a href="/wiki/Pollinator_decline" title="Pollinator decline">Pollinator decline</a></li> <li><a href="/wiki/Overfishing" title="Overfishing">Overfishing</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Astronomical</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Big_Crunch" title="Big Crunch">Big Crunch</a></li> <li><a href="/wiki/Big_Rip" title="Big Rip">Big Rip</a></li> <li><a href="/wiki/Coronal_mass_ejection" title="Coronal mass ejection">Coronal mass ejection</a></li> <li><a href="/wiki/Cosmological_phase_transition" title="Cosmological phase transition">Cosmological phase transition</a></li> <li><a href="/wiki/Geomagnetic_storm" title="Geomagnetic storm">Geomagnetic storm</a></li> <li><a href="/wiki/False_vacuum_decay" class="mw-redirect" title="False vacuum decay">False vacuum decay</a></li> <li><a href="/wiki/Gamma-ray_burst" title="Gamma-ray burst">Gamma-ray burst</a></li> <li><a href="/wiki/Heat_death_of_the_universe" title="Heat death of the universe">Heat death of the universe</a></li> <li><a href="/wiki/Proton_decay" title="Proton decay">Proton decay</a></li> <li><a href="/wiki/Virtual_black_hole" title="Virtual black hole">Virtual black hole</a></li> <li><a href="/wiki/Impact_event" title="Impact event">Impact event</a> <ul><li><a href="/wiki/Asteroid_impact_avoidance" title="Asteroid impact avoidance">Asteroid impact avoidance</a></li> <li><a href="/wiki/Asteroid_impact_prediction" title="Asteroid impact prediction">Asteroid impact prediction</a></li> <li><a href="/wiki/Potentially_hazardous_object" title="Potentially hazardous object">Potentially hazardous object</a> <ul><li><a href="/wiki/Near-Earth_object" title="Near-Earth object">Near-Earth object</a></li></ul></li> <li><a href="/wiki/Impact_winter" title="Impact winter">winter</a></li> <li><a href="/wiki/Rogue_planet" title="Rogue planet">Rogue planet</a></li> <li><a href="/wiki/Intergalactic_star" title="Intergalactic star">Rogue star</a></li></ul></li> <li><a href="/wiki/Near-Earth_supernova" title="Near-Earth supernova">Near-Earth supernova</a></li> <li><a href="/wiki/Hypernova" title="Hypernova">Hypernova</a></li> <li><a href="/wiki/Micronova" title="Micronova">Micronova</a></li> <li><a href="/wiki/Solar_flare" title="Solar flare">Solar flare</a></li> <li><a href="/wiki/Stellar_collision" title="Stellar collision">Stellar collision</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Eschatology" title="Eschatology">Eschatological</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Buddhist_eschatology" title="Buddhist eschatology">Buddhist</a> <ul><li><a href="/wiki/Maitreya" title="Maitreya">Maitreya</a></li> <li><a href="/wiki/Three_Ages_of_Buddhism" class="mw-redirect" title="Three Ages of Buddhism">Three Ages</a></li></ul></li> <li><a href="/wiki/Hindu_eschatology" title="Hindu eschatology">Hindu</a> <ul><li><a href="/wiki/Kalki" title="Kalki">Kalki</a></li> <li><a href="/wiki/Kali_Yuga" title="Kali Yuga">Kali Yuga</a></li></ul></li> <li><a href="/wiki/Last_Judgment" title="Last Judgment">Last Judgement</a></li> <li><a href="/wiki/Second_Coming" title="Second Coming">Second Coming</a> <ul><li><a href="/wiki/Book_of_Enoch" title="Book of Enoch">1 Enoch</a></li> <li><a href="/wiki/Book_of_Daniel" title="Book of Daniel">Daniel</a> <ul><li><a href="/wiki/Abomination_of_desolation" title="Abomination of desolation">Abomination of desolation</a></li> <li><a href="/wiki/Prophecy_of_Seventy_Weeks" title="Prophecy of Seventy Weeks">Prophecy of Seventy Weeks</a></li></ul></li> <li><a href="/wiki/Messiah" title="Messiah">Messiah</a></li> <li><a href="/wiki/Christian_eschatology" title="Christian eschatology">Christian</a> <ul><li><a href="/wiki/Futurism_(Christianity)" title="Futurism (Christianity)">Futurism</a></li> <li><a href="/wiki/Historicism_(Christianity)" title="Historicism (Christianity)">Historicism</a> <ul><li><a href="/wiki/Historicist_interpretations_of_the_Book_of_Revelation" title="Historicist interpretations of the Book of Revelation">Interpretations of Revelation</a></li></ul></li> <li><a href="/wiki/Idealism_(Christian_eschatology)" title="Idealism (Christian eschatology)"> Idealism</a></li> <li><a href="/wiki/Preterism" title="Preterism">Preterism</a></li> <li><a href="/wiki/2_Esdras" title="2 Esdras">2 Esdras</a></li> <li><a href="/wiki/Second_Epistle_to_the_Thessalonians" title="Second Epistle to the Thessalonians">2 Thessalonians</a> <ul><li><a href="/wiki/Man_of_sin" title="Man of sin">Man of sin</a></li> <li><a href="/wiki/Katechon" title="Katechon">Katechon</a></li></ul></li> <li><a href="/wiki/Antichrist" title="Antichrist">Antichrist</a></li> <li><a href="/wiki/Book_of_Revelation" title="Book of Revelation">Book of Revelation</a> <ul><li><a href="/wiki/Events_of_Revelation" title="Events of Revelation">Events</a> <ul><li><a href="/wiki/Four_Horsemen_of_the_Apocalypse" title="Four Horsemen of the Apocalypse">Four Horsemen of the Apocalypse</a></li> <li><a href="/wiki/Lake_of_fire" title="Lake of fire">Lake of fire</a></li> <li><a href="/wiki/Number_of_the_beast" title="Number of the beast">Number of the Beast</a></li> <li><a href="/wiki/Seven_bowls" title="Seven bowls">Seven bowls</a></li> <li><a href="/wiki/Seven_seals" title="Seven seals">Seven seals</a></li> <li><a href="/wiki/The_Beast_(Revelation)" title="The Beast (Revelation)">The Beast</a></li> <li><a href="/wiki/Two_witnesses" title="Two witnesses">Two witnesses</a></li> <li><a href="/wiki/War_in_Heaven" title="War in Heaven">War in Heaven</a></li> <li><a href="/wiki/Whore_of_Babylon" title="Whore of Babylon">Whore of Babylon</a></li></ul></li></ul></li> <li><a href="/wiki/Great_Apostasy" title="Great Apostasy">Great Apostasy</a></li> <li><a href="/wiki/New_Earth_(Christianity)" title="New Earth (Christianity)">New Earth</a></li> <li><a href="/wiki/New_Jerusalem" title="New Jerusalem">New Jerusalem</a></li> <li><a href="/wiki/Olivet_Discourse" title="Olivet Discourse">Olivet Discourse</a> <ul><li><a href="/wiki/Great_Tribulation" title="Great Tribulation">Great Tribulation</a></li></ul></li> <li><a href="/wiki/Son_of_perdition" title="Son of perdition">Son of perdition</a></li> <li><a href="/wiki/The_Sheep_and_the_Goats" title="The Sheep and the Goats">Sheep and Goats</a></li></ul></li> <li><a href="/wiki/Islamic_eschatology" title="Islamic eschatology">Islamic</a> <ul><li><a href="/wiki/Qa%27im_Al_Muhammad" title="Qa'im Al Muhammad">Al-Qa'im</a></li> <li><a href="/wiki/Beast_of_the_Earth" title="Beast of the Earth">Beast of the Earth</a></li> <li><a href="/wiki/Dhu_al-Qarnayn" title="Dhu al-Qarnayn">Dhu al-Qarnayn</a></li> <li><a href="/wiki/Dhul-Suwayqatayn" title="Dhul-Suwayqatayn">Dhul-Suwayqatayn</a></li> <li><a href="/wiki/Al-Masih_ad-Dajjal" title="Al-Masih ad-Dajjal">Dajjal</a></li> <li><a href="/wiki/Israfil" title="Israfil">Israfil</a></li> <li><a href="/wiki/Mahdi" title="Mahdi">Mahdi</a></li> <li><a href="/wiki/Sufyani" title="Sufyani">Sufyani</a></li></ul></li> <li><a href="/wiki/Jewish_eschatology" title="Jewish eschatology">Jewish</a> <ul><li><a href="/wiki/Messiah_in_Judaism" title="Messiah in Judaism">Messiah</a></li> <li><a href="/wiki/Gog_and_Magog" title="Gog and Magog">War of Gog and Magog</a></li> <li><a href="/wiki/Third_Temple" title="Third Temple">Third Temple</a></li></ul></li></ul></li> <li><a href="/wiki/Ragnar%C3%B6k" title="Ragnarök">Norse</a></li> <li><a href="/wiki/Frashokereti" title="Frashokereti">Zoroastrian</a> <ul><li><a href="/wiki/Saoshyant" title="Saoshyant">Saoshyant</a></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Others</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/2011_end_times_prediction" title="2011 end times prediction">2011 end times prediction</a></li> <li><a href="/wiki/2012_phenomenon" title="2012 phenomenon">2012 phenomenon</a></li> <li><a href="/wiki/Apocalypse" title="Apocalypse">Apocalypse</a></li> <li><a href="/wiki/Apocalyptic_literature" title="Apocalyptic literature">Apocalyptic literature</a></li> <li><a href="/wiki/Apocalypticism" title="Apocalypticism">Apocalypticism</a></li> <li><a href="/wiki/Armageddon" title="Armageddon">Armageddon</a></li> <li><a href="/wiki/Blood_moon_prophecy" title="Blood moon prophecy">Blood moon prophecy</a></li> <li><a href="/wiki/Earth_Changes" title="Earth Changes">Earth Changes</a></li> <li><a href="/wiki/Global_catastrophic_risk" title="Global catastrophic risk">End time</a></li> <li><a href="/wiki/Gog_and_Magog" title="Gog and Magog">Gog and Magog</a></li> <li><a href="/wiki/List_of_dates_predicted_for_apocalyptic_events" title="List of dates predicted for apocalyptic events">List of dates predicted for apocalyptic events</a></li> <li><a href="/wiki/Messianism" title="Messianism">Messianism</a> <ul><li><a href="/wiki/Messianic_Age" title="Messianic Age">Messianic Age</a></li></ul></li> <li><a href="/wiki/Millenarianism" title="Millenarianism">Millenarianism</a></li> <li><a href="/wiki/Millennialism" title="Millennialism">Millennialism</a> <ul><li><a href="/wiki/Premillennialism" title="Premillennialism">Premillennialism</a></li> <li><a href="/wiki/Amillennialism" title="Amillennialism">Amillennialism</a></li> <li><a href="/wiki/Postmillennialism" title="Postmillennialism">Postmillennialism</a></li></ul></li> <li><a href="/wiki/Nemesis_(hypothetical_star)" title="Nemesis (hypothetical star)">Nemesis (hypothetical star)</a></li> <li><a href="/wiki/Nibiru_cataclysm" title="Nibiru cataclysm">Nibiru cataclysm</a></li> <li><a href="/wiki/Rapture" title="Rapture">Rapture</a> <ul><li><a href="/wiki/Rapture#Prewrath_premillennialism" title="Rapture">Prewrath</a></li> <li><a href="/wiki/Posttribulation_rapture" title="Posttribulation rapture">Posttribulation rapture</a></li></ul></li> <li><a href="/wiki/Universal_resurrection" title="Universal resurrection">Resurrection of the dead</a></li> <li><a href="/wiki/World_to_come" title="World to come">World to come</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Fictional</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Alien_invasion" title="Alien invasion">Alien invasion</a></li> <li><a href="/wiki/Apocalyptic_and_post-apocalyptic_fiction" title="Apocalyptic and post-apocalyptic fiction">Apocalyptic and post-apocalyptic fiction</a> <ul><li><a href="/wiki/List_of_apocalyptic_and_post-apocalyptic_fiction" title="List of apocalyptic and post-apocalyptic fiction">List of apocalyptic and post-apocalyptic fiction</a></li> <li><a href="/wiki/List_of_apocalyptic_films" title="List of apocalyptic films">List of apocalyptic films</a></li></ul></li> <li><a href="/wiki/Climate_fiction" title="Climate fiction">Climate fiction</a></li> <li><a href="/wiki/Disaster_film" title="Disaster film">Disaster films</a> <ul><li><a href="/wiki/List_of_disaster_films" title="List of disaster films">List of disaster films</a></li></ul></li> <li><a href="/wiki/Zombie_apocalypse" title="Zombie apocalypse">Zombie apocalypse</a> <ul><li><a href="/wiki/Zombie" title="Zombie">Zombie</a></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Organizations</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Centre_for_the_Study_of_Existential_Risk" title="Centre for the Study of Existential Risk">Centre for the Study of Existential Risk</a></li> <li><a href="/wiki/Future_of_Humanity_Institute" title="Future of Humanity Institute">Future of Humanity Institute</a></li> <li><a href="/wiki/Future_of_Life_Institute" title="Future of Life Institute">Future of Life Institute</a></li> <li><a href="/wiki/Nuclear_Threat_Initiative" title="Nuclear Threat Initiative">Nuclear Threat Initiative</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">General</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Cyberwarfare" title="Cyberwarfare">Cyberwarfare</a></li> <li><a href="/wiki/Disaster" title="Disaster">Disaster</a></li> <li><a href="/wiki/Economic_depression" title="Economic depression">Depression</a></li> <li><a href="/wiki/Financial_crisis" title="Financial crisis">Financial crisis</a></li> <li><a href="/wiki/Pandemic" title="Pandemic">Pandemic</a></li> <li><a href="/wiki/Riot" title="Riot">Riots</a></li> <li><a href="/wiki/Social_crisis" title="Social crisis">Social crisis</a></li> <li><a href="/wiki/Survivalism" title="Survivalism">Survivalism</a></li></ul> </div></td></tr><tr><td class="navbox-abovebelow" colspan="2"><div> <ul><li><b><span class="nowrap"><span class="noviewer" typeof="mw:File"><a href="/wiki/File:The_Earth_seen_from_Apollo_17.jpg" class="mw-file-description"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/9/97/The_Earth_seen_from_Apollo_17.jpg/16px-The_Earth_seen_from_Apollo_17.jpg" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/9/97/The_Earth_seen_from_Apollo_17.jpg/24px-The_Earth_seen_from_Apollo_17.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/9/97/The_Earth_seen_from_Apollo_17.jpg/32px-The_Earth_seen_from_Apollo_17.jpg 2x" data-file-width="3000" data-file-height="3002" /></a></span> </span><a href="/wiki/Portal:World" title="Portal:World">World portal</a></b></li> <li><span class="noviewer" typeof="mw:File"><span title="Category"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/16px-Symbol_category_class.svg.png" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/23px-Symbol_category_class.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/31px-Symbol_category_class.svg.png 2x" data-file-width="180" data-file-height="185" /></span></span> Categories <ul><li><a href="/wiki/Category:Apocalypticism" title="Category:Apocalypticism">Apocalypticism</a></li> <li><a href="/wiki/Category:Future_problems" title="Category:Future problems">Future problems</a></li> <li><a href="/wiki/Category:Hazards" title="Category:Hazards">Hazards</a></li> <li><a href="/wiki/Category:Risk_analysis" title="Category:Risk analysis">Risk analysis</a></li> <li><a href="/wiki/Category:Doomsday_scenarios" title="Category:Doomsday scenarios">Doomsday scenarios</a></li></ul></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Information_security88" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="3"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Information_security" title="Template:Information security"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Information_security" title="Template talk:Information security"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Information_security" title="Special:EditPage/Template:Information security"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Information_security88" style="font-size:114%;margin:0 4em"><a href="/wiki/Information_security" title="Information security">Information security</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Related security categories</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Computer_security" title="Computer security">Computer security</a></li> <li><a href="/wiki/Automotive_security" title="Automotive security">Automotive security</a></li> <li><a href="/wiki/Cybercrime" title="Cybercrime">Cybercrime</a> <ul><li><a href="/wiki/Cybersex_trafficking" title="Cybersex trafficking">Cybersex trafficking</a></li> <li><a href="/wiki/Computer_fraud" title="Computer fraud">Computer fraud</a></li></ul></li> <li><a href="/wiki/Cybergeddon" title="Cybergeddon">Cybergeddon</a></li> <li><a href="/wiki/Cyberterrorism" title="Cyberterrorism">Cyberterrorism</a></li> <li><a href="/wiki/Cyberwarfare" title="Cyberwarfare">Cyberwarfare</a></li> <li><a href="/wiki/Electronic_warfare" title="Electronic warfare">Electronic warfare</a></li> <li><a href="/wiki/Information_warfare" title="Information warfare">Information warfare</a></li> <li><a href="/wiki/Internet_security" title="Internet security">Internet security</a></li> <li><a href="/wiki/Mobile_security" title="Mobile security">Mobile security</a></li> <li><a href="/wiki/Network_security" title="Network security">Network security</a></li> <li><a href="/wiki/Copy_protection" title="Copy protection">Copy protection</a></li> <li><a href="/wiki/Digital_rights_management" title="Digital rights management">Digital rights management</a></li></ul> </div></td><td class="noviewer navbox-image" rowspan="3" style="width:1px;padding:0 0 0 2px"><div><figure class="mw-halign-center" typeof="mw:File"><a href="/wiki/File:CIAJMK1209-en.svg" class="mw-file-description" title="vectorial version"><img alt="vectorial version" src="//upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/150px-CIAJMK1209-en.svg.png" decoding="async" width="150" height="150" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/225px-CIAJMK1209-en.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/300px-CIAJMK1209-en.svg.png 2x" data-file-width="496" data-file-height="496" /></a><figcaption>vectorial version</figcaption></figure></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Threat_(computer)" class="mw-redirect" title="Threat (computer)">Threats</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Adware" title="Adware">Adware</a></li> <li><a href="/wiki/Advanced_persistent_threat" title="Advanced persistent threat">Advanced persistent threat</a></li> <li><a href="/wiki/Arbitrary_code_execution" title="Arbitrary code execution">Arbitrary code execution</a></li> <li><a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">Backdoors</a></li> <li>Bombs <ul><li><a href="/wiki/Fork_bomb" title="Fork bomb">Fork</a></li> <li><a href="/wiki/Logic_bomb" title="Logic bomb">Logic</a></li> <li><a href="/wiki/Time_bomb_(software)" title="Time bomb (software)">Time</a></li> <li><a href="/wiki/Zip_bomb" title="Zip bomb">Zip</a></li></ul></li> <li><a href="/wiki/Hardware_backdoor" title="Hardware backdoor">Hardware backdoors</a></li> <li><a href="/wiki/Code_injection" title="Code injection">Code injection</a></li> <li><a href="/wiki/Crimeware" title="Crimeware">Crimeware</a></li> <li><a href="/wiki/Cross-site_scripting" title="Cross-site scripting">Cross-site scripting</a></li> <li><a href="/wiki/Cross-site_leaks" title="Cross-site leaks">Cross-site leaks</a></li> <li><a href="/wiki/DOM_clobbering" title="DOM clobbering">DOM clobbering</a></li> <li><a href="/wiki/History_sniffing" title="History sniffing">History sniffing</a></li> <li><a href="/wiki/Cryptojacking" title="Cryptojacking">Cryptojacking</a></li> <li><a href="/wiki/Botnet" title="Botnet">Botnets</a></li> <li><a href="/wiki/Data_breach" title="Data breach">Data breach</a></li> <li><a href="/wiki/Drive-by_download" title="Drive-by download">Drive-by download</a></li> <li><a href="/wiki/Browser_Helper_Object" title="Browser Helper Object">Browser Helper Objects</a></li> <li><a href="/wiki/Computer_virus" title="Computer virus">Viruses</a></li> <li><a href="/wiki/Data_scraping" title="Data scraping">Data scraping</a></li> <li><a href="/wiki/Denial-of-service_attack" title="Denial-of-service attack">Denial-of-service attack</a></li> <li><a href="/wiki/Eavesdropping" title="Eavesdropping">Eavesdropping</a></li> <li><a href="/wiki/Email_fraud" title="Email fraud">Email fraud</a></li> <li><a href="/wiki/Email_spoofing" title="Email spoofing">Email spoofing</a></li> <li><a href="/wiki/Exploit_(computer_security)" title="Exploit (computer security)">Exploits</a></li> <li><a href="/wiki/Dialer#Fraudulent_dialer" title="Dialer">Fraudulent dialers</a></li> <li><a href="/wiki/Hacktivism" title="Hacktivism">Hacktivism</a></li> <li><a href="/wiki/Infostealer" title="Infostealer">Infostealer</a></li> <li><a href="/wiki/Insecure_direct_object_reference" title="Insecure direct object reference">Insecure direct object reference</a></li> <li><a href="/wiki/Keystroke_logging" title="Keystroke logging">Keystroke loggers</a></li> <li><a href="/wiki/Malware" title="Malware">Malware</a></li> <li><a href="/wiki/Payload_(computing)" title="Payload (computing)">Payload</a></li> <li><a href="/wiki/Phishing" title="Phishing">Phishing</a> <ul><li><a href="/wiki/Voice_phishing" title="Voice phishing">Voice</a></li></ul></li> <li><a href="/wiki/Polymorphic_engine" title="Polymorphic engine">Polymorphic engine</a></li> <li><a href="/wiki/Privilege_escalation" title="Privilege escalation">Privilege escalation</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Rootkit" title="Rootkit">Rootkits</a></li> <li><a href="/wiki/Scareware" title="Scareware">Scareware</a></li> <li><a href="/wiki/Shellcode" title="Shellcode">Shellcode</a></li> <li><a href="/wiki/Spamming" title="Spamming">Spamming</a></li> <li><a href="/wiki/Social_engineering_(security)" title="Social engineering (security)">Social engineering</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a href="/wiki/Software_bug" title="Software bug">Software bugs</a></li> <li><a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan horses</a></li> <li><a href="/wiki/Hardware_Trojan" title="Hardware Trojan">Hardware Trojans</a></li> <li><a href="/wiki/Remote_access_trojan" class="mw-redirect" title="Remote access trojan">Remote access trojans</a></li> <li><a href="/wiki/Vulnerability_(computer_security)" title="Vulnerability (computer security)">Vulnerability</a></li> <li><a href="/wiki/Web_shell" title="Web shell">Web shells</a></li> <li><a href="/wiki/Wiper_(malware)" title="Wiper (malware)">Wiper</a></li> <li><a href="/wiki/Computer_worm" title="Computer worm">Worms</a></li> <li><a href="/wiki/SQL_injection" title="SQL injection">SQL injection</a></li> <li><a href="/wiki/Rogue_security_software" title="Rogue security software">Rogue security software</a></li> <li><a href="/wiki/Zombie_(computing)" title="Zombie (computing)">Zombie</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Defenses</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Application_security" title="Application security">Application security</a> <ul><li><a href="/wiki/Secure_coding" title="Secure coding">Secure coding</a></li> <li>Secure by default</li> <li><a href="/wiki/Secure_by_design" title="Secure by design">Secure by design</a> <ul><li><a href="/wiki/Misuse_case" title="Misuse case">Misuse case</a></li></ul></li></ul></li> <li><a href="/wiki/Computer_access_control" title="Computer access control">Computer access control</a> <ul><li><a href="/wiki/Authentication" title="Authentication">Authentication</a> <ul><li><a href="/wiki/Multi-factor_authentication" title="Multi-factor authentication">Multi-factor authentication</a></li></ul></li> <li><a href="/wiki/Authorization" title="Authorization">Authorization</a></li></ul></li> <li><a href="/wiki/Computer_security_software" title="Computer security software">Computer security software</a> <ul><li><a href="/wiki/Antivirus_software" title="Antivirus software">Antivirus software</a></li> <li><a href="/wiki/Security-focused_operating_system" title="Security-focused operating system">Security-focused operating system</a></li></ul></li> <li><a href="/wiki/Data-centric_security" title="Data-centric security">Data-centric security</a></li> <li><a href="/wiki/Obfuscation_(software)" title="Obfuscation (software)">Software obfuscation</a></li> <li><a href="/wiki/Data_masking" title="Data masking">Data masking</a></li> <li><a href="/wiki/Encryption" title="Encryption">Encryption</a></li> <li><a href="/wiki/Firewall_(computing)" title="Firewall (computing)">Firewall</a></li> <li><a href="/wiki/Intrusion_detection_system" title="Intrusion detection system">Intrusion detection system</a> <ul><li><a href="/wiki/Host-based_intrusion_detection_system" title="Host-based intrusion detection system">Host-based intrusion detection system</a> (HIDS)</li> <li><a href="/wiki/Anomaly_detection" title="Anomaly detection">Anomaly detection</a></li></ul></li> <li><a href="/wiki/Information_security_management" title="Information security management">Information security management</a> <ul><li><a href="/wiki/Information_risk_management" class="mw-redirect" title="Information risk management">Information risk management</a></li> <li><a href="/wiki/Security_information_and_event_management" title="Security information and event management">Security information and event management</a> (SIEM)</li></ul></li> <li><a href="/wiki/Runtime_application_self-protection" title="Runtime application self-protection">Runtime application self-protection</a></li> <li><a href="/wiki/Site_isolation" title="Site isolation">Site isolation</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"><style data-mw-deduplicate="TemplateStyles:r1038841319">.mw-parser-output .tooltip-dotted{border-bottom:1px dotted;cursor:help}</style></div><div role="navigation" class="navbox authority-control" aria-label="Navbox558" style="padding:3px"><table class="nowraplinks hlist navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Help:Authority_control" title="Help:Authority control">Authority control databases</a>: National <span class="mw-valign-text-top noprint" typeof="mw:File/Frameless"><a href="https://www.wikidata.org/wiki/Q4071928#identifiers" title="Edit this at Wikidata"><img alt="Edit this at Wikidata" src="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/10px-OOjs_UI_icon_edit-ltr-progressive.svg.png" decoding="async" width="10" height="10" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/15px-OOjs_UI_icon_edit-ltr-progressive.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/20px-OOjs_UI_icon_edit-ltr-progressive.svg.png 2x" data-file-width="20" data-file-height="20" /></a></span></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"><ul><li><span class="uid"><span class="rt-commentedText tooltip tooltip-dotted" title="Hacking"><a rel="nofollow" class="external text" href="https://id.loc.gov/authorities/sh2013002597">United States</a></span></span></li></ul></div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐web.codfw.main‐b766959bd‐4frwd Cached time: 20250214041056 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 1.305 seconds Real time usage: 1.509 seconds Preprocessor visited node count: 12019/1000000 Post‐expand include size: 159595/2097152 bytes Template argument size: 12435/2097152 bytes Highest expansion depth: 15/100 Expensive parser function count: 16/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 173837/5000000 bytes Lua time usage: 0.846/10.000 seconds Lua memory usage: 18505186/52428800 bytes Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 1321.206 1 -total 29.15% 385.179 140 Template:Sfn 14.94% 197.345 1 Template:Reflist 12.65% 167.141 3 Template:Anl 9.78% 129.152 4 Template:Navbox 9.42% 124.441 1 Template:Doomsday 8.51% 112.469 4 Template:Cite_news 8.25% 109.011 19 Template:Cite_book 7.02% 92.794 1 Template:Short_description 4.49% 59.365 2 Template:Pagetype --> <!-- Saved in parser cache with key enwiki:pcache:37925700:|#|:idhash:canonical and timestamp 20250214041056 and revision id 1275153820. Rendering was triggered because: page-view --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?useformat=desktop&type=1x1&usesul3=0" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Cyberattack&oldid=1275153820">https://en.wikipedia.org/w/index.php?title=Cyberattack&oldid=1275153820</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Cyberattacks" title="Category:Cyberattacks">Cyberattacks</a></li><li><a href="/wiki/Category:Cybercrime" title="Category:Cybercrime">Cybercrime</a></li><li><a href="/wiki/Category:Attacks_by_method" title="Category:Attacks by method">Attacks by method</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:Pages_with_non-numeric_formatnum_arguments" title="Category:Pages with non-numeric formatnum arguments">Pages with non-numeric formatnum arguments</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_is_different_from_Wikidata" title="Category:Short description is different from Wikidata">Short description is different from Wikidata</a></li><li><a href="/wiki/Category:Use_dmy_dates_from_August_2019" title="Category:Use dmy dates from August 2019">Use dmy dates from August 2019</a></li><li><a href="/wiki/Category:Use_American_English_from_August_2019" title="Category:Use American English from August 2019">Use American English from August 2019</a></li><li><a href="/wiki/Category:All_Wikipedia_articles_written_in_American_English" title="Category:All Wikipedia articles written in American English">All Wikipedia articles written in American English</a></li><li><a href="/wiki/Category:Articles_containing_potentially_dated_statements_from_2019" title="Category:Articles containing potentially dated statements from 2019">Articles containing potentially dated statements from 2019</a></li><li><a href="/wiki/Category:All_articles_containing_potentially_dated_statements" title="Category:All articles containing potentially dated statements">All articles containing potentially dated statements</a></li><li><a href="/wiki/Category:Articles_containing_potentially_dated_statements_from_2023" title="Category:Articles containing potentially dated statements from 2023">Articles containing potentially dated statements from 2023</a></li><li><a href="/wiki/Category:Pages_displaying_wikidata_descriptions_as_a_fallback_via_Module:Annotated_link" title="Category:Pages displaying wikidata descriptions as a fallback via Module:Annotated link">Pages displaying wikidata descriptions as a fallback via Module:Annotated link</a></li><li><a href="/wiki/Category:Wikipedia_articles_with_ASCII_art" title="Category:Wikipedia articles with ASCII art">Wikipedia articles with ASCII art</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 11 February 2025, at 10:54<span class="anonymous-show"> (UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Cyberattack&mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" lang="en" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><picture><source media="(min-width: 500px)" srcset="/w/resources/assets/poweredby_mediawiki.svg" width="88" height="31"><img src="/w/resources/assets/mediawiki_compact.svg" alt="Powered by MediaWiki" width="25" height="25" loading="lazy"></picture></a></li> </ul> </footer> </div> </div> </div> <div class="vector-header-container vector-sticky-header-container"> <div id="vector-sticky-header" class="vector-sticky-header"> <div class="vector-sticky-header-start"> <div class="vector-sticky-header-icon-start vector-button-flush-left vector-button-flush-right" aria-hidden="true"> <button class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-sticky-header-search-toggle" tabindex="-1" data-event-name="ui.vector-sticky-search-form.icon"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </button> </div> <div role="search" class="vector-search-box-vue vector-search-box-show-thumbnail vector-search-box"> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail"> <form action="/w/index.php" id="vector-sticky-search-form" class="cdx-search-input cdx-search-input--has-end-button"> <div class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia"> <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <div class="vector-sticky-header-context-bar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-sticky-header-toc" class="vector-dropdown mw-portlet mw-portlet-sticky-header-toc vector-sticky-header-toc vector-button-flush-left" > <input type="checkbox" id="vector-sticky-header-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-sticky-header-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-sticky-header-toc-label" for="vector-sticky-header-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-sticky-header-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div class="vector-sticky-header-context-bar-primary" aria-hidden="true" ><span class="mw-page-title-main">Cyberattack</span></div> </div> </div> <div class="vector-sticky-header-end" aria-hidden="true"> <div class="vector-sticky-header-icons"> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-talk-sticky-header" tabindex="-1" data-event-name="talk-sticky-header"><span class="vector-icon mw-ui-icon-speechBubbles mw-ui-icon-wikimedia-speechBubbles"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-subject-sticky-header" tabindex="-1" data-event-name="subject-sticky-header"><span class="vector-icon mw-ui-icon-article mw-ui-icon-wikimedia-article"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-history-sticky-header" tabindex="-1" data-event-name="history-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-history mw-ui-icon-wikimedia-wikimedia-history"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only mw-watchlink" id="ca-watchstar-sticky-header" tabindex="-1" data-event-name="watch-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-star mw-ui-icon-wikimedia-wikimedia-star"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-edit-sticky-header" tabindex="-1" data-event-name="wikitext-edit-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-wikiText mw-ui-icon-wikimedia-wikimedia-wikiText"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-ve-edit-sticky-header" tabindex="-1" data-event-name="ve-edit-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-edit mw-ui-icon-wikimedia-wikimedia-edit"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-viewsource-sticky-header" tabindex="-1" data-event-name="ve-edit-protected-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-editLock mw-ui-icon-wikimedia-wikimedia-editLock"></span> <span></span> </a> </div> <div class="vector-sticky-header-buttons"> <button class="cdx-button cdx-button--weight-quiet mw-interlanguage-selector" id="p-lang-btn-sticky-header" tabindex="-1" data-event-name="ui.dropdown-p-lang-btn-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-language mw-ui-icon-wikimedia-wikimedia-language"></span> <span>39 languages</span> </button> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive" id="ca-addsection-sticky-header" tabindex="-1" data-event-name="addsection-sticky-header"><span class="vector-icon mw-ui-icon-speechBubbleAdd-progressive mw-ui-icon-wikimedia-speechBubbleAdd-progressive"></span> <span>Add topic</span> </a> </div> <div class="vector-sticky-header-icon-end"> <div class="vector-user-links"> </div> </div> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-b766959bd-bckgn","wgBackendResponseTime":144,"wgPageParseReport":{"limitreport":{"cputime":"1.305","walltime":"1.509","ppvisitednodes":{"value":12019,"limit":1000000},"postexpandincludesize":{"value":159595,"limit":2097152},"templateargumentsize":{"value":12435,"limit":2097152},"expansiondepth":{"value":15,"limit":100},"expensivefunctioncount":{"value":16,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":173837,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 1321.206 1 -total"," 29.15% 385.179 140 Template:Sfn"," 14.94% 197.345 1 Template:Reflist"," 12.65% 167.141 3 Template:Anl"," 9.78% 129.152 4 Template:Navbox"," 9.42% 124.441 1 Template:Doomsday"," 8.51% 112.469 4 Template:Cite_news"," 8.25% 109.011 19 Template:Cite_book"," 7.02% 92.794 1 Template:Short_description"," 4.49% 59.365 2 Template:Pagetype"]},"scribunto":{"limitreport-timeusage":{"value":"0.846","limit":"10.000"},"limitreport-memusage":{"value":18505186,"limit":52428800},"limitreport-logs":"anchor_id_list = table#1 {\n [\"CITEREFAblonBogart2017\"] = 1,\n [\"CITEREFAgrafiotis_et_al.2018\"] = 1,\n [\"CITEREFAl-TurjmanSalama2020\"] = 1,\n [\"CITEREFAravindakshan2021\"] = 1,\n [\"CITEREFAsbaşTuzlukaya2022\"] = 1,\n [\"CITEREFBareja2021\"] = 1,\n [\"CITEREFCrawley2021\"] = 1,\n [\"CITEREFDaswaniElbayadi2021\"] = 1,\n [\"CITEREFFosco2018\"] = 1,\n [\"CITEREFFowler2016\"] = 1,\n [\"CITEREFHaberHibbert2018\"] = 1,\n [\"CITEREFHyslip2020\"] = 1,\n [\"CITEREFLehto2022\"] = 1,\n [\"CITEREFLiLiu2021\"] = 1,\n [\"CITEREFLibickiAblonWebb2015\"] = 1,\n [\"CITEREFLilienthalAhmad2015\"] = 1,\n [\"CITEREFLinkovKott2019\"] = 1,\n [\"CITEREFMakridis2021\"] = 1,\n [\"CITEREFOppenheimer2024\"] = 1,\n [\"CITEREFPerlroth2021\"] = 1,\n [\"CITEREFSeaman2020\"] = 1,\n [\"CITEREFSeidPopovBlix2024\"] = 1,\n [\"CITEREFShandlerGomez2023\"] = 1,\n [\"CITEREFSkopikPahi2020\"] = 1,\n [\"CITEREFSloanWarner2019\"] = 1,\n [\"CITEREFSobers2021\"] = 1,\n [\"CITEREFSoloveHartzog2022\"] = 1,\n [\"CITEREFSoodEnbody2014\"] = 1,\n [\"CITEREFTjoa_et_al.2024\"] = 1,\n [\"CITEREFVerbruggen2024\"] = 1,\n [\"CITEREFVähäkainuLehtoKariluoto2022\"] = 1,\n [\"CITEREFWilkinson2023\"] = 1,\n}\ntemplate_list = table#1 {\n [\"Anl\"] = 3,\n [\"As of\"] = 3,\n [\"Authority control\"] = 1,\n [\"Cite book\"] = 19,\n [\"Cite journal\"] = 9,\n [\"Cite news\"] = 4,\n [\"Cite web\"] = 2,\n [\"Computer security\"] = 1,\n [\"Doomsday\"] = 1,\n [\"Further\"] = 1,\n [\"Main\"] = 1,\n [\"Redirect\"] = 1,\n [\"Refbegin\"] = 1,\n [\"Refend\"] = 1,\n [\"Reflist\"] = 1,\n [\"See also\"] = 4,\n [\"Sfn\"] = 140,\n [\"Sfnref\"] = 2,\n [\"Short description\"] = 1,\n [\"US$\"] = 1,\n [\"Use American English\"] = 1,\n [\"Use dmy dates\"] = 1,\n}\narticle_whitelist = table#1 {\n}\nciteref_patterns = table#1 {\n}\ntable#1 {\n [\"size\"] = \"tiny\",\n}\n"},"cachereport":{"origin":"mw-web.codfw.main-b766959bd-4frwd","timestamp":"20250214041056","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Cyberattack","url":"https:\/\/en.wikipedia.org\/wiki\/Cyberattack","sameAs":"http:\/\/www.wikidata.org\/entity\/Q4071928","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q4071928","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2012-12-14T04:27:59Z","dateModified":"2025-02-11T10:54:40Z","headline":"any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of a computer system"}</script> </body> </html>