www.ceeol.com Open in urlscan Pro
108.141.178.235  Public Scan

URL: https://www.ceeol.com/search/article-detail?id=1161455
Submission: On June 03 via manual from GB — Scanned from NL

Form analysis 1 forms found in the DOM

POST

<form data-ng-class="{'search-error':!searchEmpty &amp;&amp; !filter.SearchText}" class="search-container ng-pristine ng-valid" ng-submit="defaultSearch($event,'/search/search-result')" method="post" novalidate="">
  <span></span>
  <input data-ng-model="filter.SearchText" id="searchText" maxlength="200" type="text" class="form-control main-search-input ng-pristine ng-valid" placeholder="Search...">
  <select id="searchInOption" data-ng-model="filter.SearchInOption" class="form-control main-search-option ng-pristine ng-valid">
    <option value="0">All Content</option>
    <option value="1">PDF Content</option>
    <option value="2">Author Name</option>
    <option value="3">Series Title</option>
    <option value="4">Journal Title</option>
    <option value="5">Book Title</option>
    <option value="6">Grey Literature Title</option>
    <option value="7">Publisher</option>
    <option value="9">Key Words</option>
    <option value="10">ISBN</option>
    <option value="11">ISSN</option>
  </select>
  <button data-ng-click="defaultSearch($event,'/search/search-result')" id="btnSearch" type="submit" class="btn btn-search-icon" title="Search"><i class="fa fa-search"></i></button>
  <a href="/search/advanced-search" class="btn btn-advance-search">Advanced Search</a>
  <input name="__RequestVerificationToken" type="hidden" value="CfDJ8A_WV7JzZChKv7EfQMTQJyV1DsZ86_dJq4MPjWS8oWqz6MPr5xOR1ome7R_v1uKFXBrCD5rDPd8mf1b5C7rZfv-0-O1dnDflbFSyruzUnhaESJwnnZbb1Kho8sDo07CGsfOShmeaMVA7_ugBcJqr-xw">
</form>

Text Content

Cookies help us deliver our services. By using our services, you agree to our
use of cookies. Learn more. I agree
 * Log In
 * Register

All Content PDF Content Author Name Series Title Journal Title Book Title Grey
Literature Title Publisher Key Words ISBN ISSN Advanced Search
 * MENU
 * Home
 * SUBJECT AREAS
 * PUBLISHERS
 * JOURNALS
 * eBooks
 * GREY LITERATURE
 * CEEOL-DIGITS
 * INDIVIDUAL ACCOUNT
 * Help
 * Contact
 * for LIBRARIANS
 * for PUBLISHERS


Download


CYBER ATTACK AGAINST E-ALBANIA AND ITS SOCIAL, ECONOMIC AND STRATEGIC EFFECTS
CYBER ATTACK AGAINST E-ALBANIA AND ITS SOCIAL, ECONOMIC AND STRATEGIC EFFECTS

Author(s): Aleksander Biberaj, Enida Sheme, Alban Rakipi, Sonila Xhaferllari,
Renalda Kushe, Mirjeta Alinci
Subject(s): Public Administration, Security and defense, ICT Information and
Communications Technologies, Socio-Economic Research
Published by: Acadlore Publishing Services Limited
Keywords: Artificial intelligence; E-Albania; Electronic attack; Cyber security;
Data base; HomeLand justice; Pattern behavior; Traffics malware;


Summary/Abstract: During last years, even because of pandemic situation caused
by covid-19 virus, in Albania most of governmental public services for citizens,
businesses and other customers were offered in an electronic way by creating a
national database (e-Albania), offering more than 2200 services. As this
electronic system was newly implemented, time after time it was attacked from
hackers in different sectors of services, causing the interruption of service
for hours, downloading all the confidential information and publishing them.
After several partial attacks, in July 2022 came the general attack of the whole
system, which black out the system and services for several days. Cyber actors -
identifying as “HomeLand Justice” - launched a destructive cyber-attack against
e-Albania which rendered websites and services unavailable. An investigation
indicates cyber actors acquired initial access to the victim’s network
approximately 14 months before launching the destructive cyber-attack, which
included a ransomware-style file encryptor and disk wiping malware. The actors
maintained continuous network access for approximately a year, periodically
accessing and exfiltrating e-mail content. From late July to mid-August 2022,
social media accounts associated with HomeLand Justice demonstrated a repeated
pattern of advertising Albanian Government information for release, posting a
poll asking respondents to select the government information to be released by
HomeLand Justice, and then releasing that information - either in a .zip file or
a video of a screen recording with the documents shown. This cyber-attack
creates social problems, economical loss and influenced negatively in the
reputation of e-Albania and damage as well strategically the country and
development of this sector in the future. Methodology: We have monitored the
system and the attack, and we continue to do this. We analyze and synthesis the
data collected, to come to conclusions and recommendations needed for the
future. All the data which we have used are open for public, and mostly are
primary data. The research method combines both quantitative and qualitative
methods, but it is closer with qualitative method, as far as there in not enough
data for using e pure quantitative analysis. We have used mostly the descriptive
method. Results/Findings: Improving essentially the cyber infrastructure to
avoid in the future such attacks with high social, economic and strategical
cost. Conclusions: In the institution there was not a team for Cyber Security
Monitoring the system, so called SOC (Security Operation Center), who controls
in the real time all the logins. It was missing as well so called “Identifying
Behavior”. There was not e separation of active directory, in physic machines
and virtual machines, they were altogether. As the administrator had Full Right
Privilege, the hacker doesn’t need to create a Privilege Escalation Vertical, so
he easily took all the right of Admin. Originality and Practical Implications:
The paper is original; it has not been previously published and it is not under
consideration by any other publisher. The originality of the method stands in
the fact that it is the first case in the world in information age, that a
country (a whole electronic system, e-Albania), face a such complex, well
organized and hard cyber-attack, which collapse the system for several days. All
the data are authentic ones.

 * Details
 * Contents

Journal: The Journal of Corporate Governance, Insurance, and Risk Management
(JCGIRM)

 * Issue Year: 9/2022
 * Issue No: 2
 * Page Range: 341-347
 * Page Count: 7
 * Language: English

 * Content File-PDF

Back to list


RELATED CONTENT





ABOUT

CEEOL is a leading provider of academic eJournals, eBooks and Grey Literature
documents in Humanities and Social Sciences from and about Central, East and
Southeast Europe. In the rapidly changing digital sphere CEEOL is a reliable
source of adjusting expertise trusted by scholars, researchers, publishers, and
librarians. CEEOL offers various services to subscribing institutions and their
patrons to make access to its content as easy as possible. CEEOL supports
publishers to reach new audiences and disseminate the scientific achievements to
a broad readership worldwide. Un-affiliated scholars have the possibility to
access the repository by creating their their personal user account.


CONTACT US

Central and Eastern European Online Library GmbH
Basaltstrasse 9
60487 Frankfurt am Main
Germany
Amtsgericht Frankfurt am Main HRB 102056
VAT number: DE300273105
Phone: +49 (0)69-20026820
Email: info@ceeol.com


CONNECT WITH CEEOL

 * Join our Facebook page
 * Follow us on Twitter

2024 © CEEOL. ALL Rights Reserved. Privacy Policy | Terms & Conditions of use
ver2.0.902
×Close

LOGIN CEEOL

×



Invalid username or password! Please check the fields below.

Username (Email)
Password
My New User Account
Forgot Password Register
×

Enter your Username (Email) below.

Username (Email) Send
Shibboleth Login
Login Cancel