Cyber espionage through Botnets

Investor logo

Warning

This publication doesn't include Institute of Computer Science. It includes Faculty of Law. Official publication website can be found on muni.cz.
Authors

SZÁDECZKY Tamás BEDERNA Zsolt

Year of publication 2020
Type Article in Periodical
Magazine / Source Security Journal
MU Faculty or unit

Faculty of Law

Citation
Web Open access časopisu
Doi http://dx.doi.org/10.1057/s41284-019-00194-6
Keywords Botnet; Network science; Cyber espionage; APT28; VPNFilter
Attached files
Description Botnets, the groups of illegally controlled infected devices on the Internet have had a history of two decades already. This history shows an evolution of the infection techniques, the scope of the target devices, and their usage. Thus, the new direction is the usage of sophisticated data leakage techniques by state-sponsored hacker groups. Our article analyses this evolution while focusing on Botnet usage for cyber espionage. We present the Botnet architecture in the context of network science research, lifecycle, applied network protocols, and capabilities. Next, we analyze two examples, the APT28 group activities and the VPNFilter Botnet, which demonstrate the real-life cyber espionage capability of this technique.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.

More info