The State of the Art of Cryptography-Based Cyber-Attacks
Keywords:
State of the Art, Cryptocurrency, Cryptography-Based Cyber-AttacksAbstract
This paper objective was to investigate the state of the art of crypto-based cyber-attacks during 1989-2019. Documentary research was employed for data analysis. The findings found that cryptography-based cyber-attacks during 1989-2019 could be defined as any attacks mainly focus on encryption technology-related crimes, classified into five key groups-ransomware, cryptojacking, coin thief, illegal money transfer, and fake identity. Simultaneously, dirty fiat currency and dirty cryptocurrency were investigated in these categories as mediums of exchange in cybercrimes. In addition, profit and availability were two key incentives for cryptographybased cyber-attackers during 1989-2009. Cybercriminals would change cryptography-based tools and targeted groups or market back and forth due to rise and fall of profit from their attacks. For profit-oriented incentive, cryptojacking, ransomware, coin thief, and illegal money transfer were key cybercrimes. In addition, cybercriminals intentionally lessened availability of their targeted devices of victims with sabotage-oriented disk wipers. Last, all illegal activities-based classification of cryptography-based cyber-attacks could be categorized into eCSIRT’s cyberattacks as follows: Abusive Content, Malicious Code, Intrusion Attempts, Intrusions, Availability, Information Security, and Fraud.