2020 International Conference on Information and Communication Technology Convergence (ICTC) 2020
DOI: 10.1109/ictc49870.2020.9289506
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the Asymmetrical Relationships between State Actors and APT Threat Groups

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Phishing exploits the weakest link in the system by impersonating a trusted entity for sensitive information (i.e., account credentials) [7,8], and the annual financial loss from the phishing activities in the U.S. accounts of 61 million USD to 3 billion USD [9]. According to the FBI's Internet Crime Report, phishing was the most common type of cybercrime in 2020.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Phishing exploits the weakest link in the system by impersonating a trusted entity for sensitive information (i.e., account credentials) [7,8], and the annual financial loss from the phishing activities in the U.S. accounts of 61 million USD to 3 billion USD [9]. According to the FBI's Internet Crime Report, phishing was the most common type of cybercrime in 2020.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In McClure's presentation at RSA conference 2015 suggests that senior Sony executives, including CEO Michael Lynton, received fake Apple ID verification emails that contained a link to "ioscareteam.net" [30]. Kim et al [8] pointed out the spear phishing techniques were most widely used as "Initial Access" in the SPE hacking which carried out spreading malwares, deleting files, and corrupt master boot records (MBR).…”
Section: Phishing Campaignsmentioning
confidence: 99%
“…In other words, mobile malware attacks threaten cybersecurity in terms of confidentiality, integrity, and availability of data [3]. Established attack groups are capable of penetrating and destroying servers, networks, client software, client hardware, and mobile device users [7,8].…”
Section: Introductionmentioning
confidence: 99%