This picture shows how different types of systems were hacked using various different techniques.
A very interesting part in the history of the cyber attacks consists of a series of cyber attacks employing different technologies that was more like a cyber war.
These were a series of early operations but can be used to understand the changing trends in cyber attacks. Clipper chip was an operation wherein the attackers incorporated chips into landline phones of most US homes. With the help of these chips they were able to monitor communications that went on using those landlines. Not just that, later it was found that communications over emails and other communications were also monitored. Moonlight maze, another interesting operation, was a type of cyber attack that mainly aimed at attacking various organizations in the US. The attackers created proxies (proxy identity) in order to get access to the systems of the US organizations. With the help of these proxies, they ( attackers) were able to hide their real identities and when the US government tried to put a check on this unauthorized information retrieval, they collected information from the proxies and not the real identities or real information. Solar sunrise was an important operation that targeted defense networks by exploiting their system vulnerabilities. They first tried to find out vulnerabilities of the system and when such a vulnerability existed they incorporated programs into the target systems that acted like sniffers to gather information. Another operation that was carried out was the Buckshoot Yankee. This was aimed at attacking specifically the US defense network. The attack was carried out with the help of USBs that when attached to a device, injected Trojans into the victim’s machine or computer or network. Desert storm was also a type of attack wherein the radars set up by Saddam Hussain for alerting military forces with respect to any incoming airplanes spotted that could possibly cause destruction, were attacked. This was done by tampering the radars with fake information. And the last but not the least, Bosnia war. Herein, fake news, fake information was delivered to militaries on the field.
In conclusion, cyber attacks have evolved with time and intensified. The losses caused because of this also have been showing increasing trends.
Also reports tell that, majority of cyber attacks have occurred due to the shortfall of the cybersecurity workforce. This has to be mended before it’s too late to do so.