www.ceeol.com
Open in
urlscan Pro
108.141.178.235
Public Scan
URL:
https://www.ceeol.com/search/article-detail?id=1161455
Submission: On June 03 via manual from GB — Scanned from NL
Submission: On June 03 via manual from GB — Scanned from NL
Form analysis
1 forms found in the DOMPOST
<form data-ng-class="{'search-error':!searchEmpty && !filter.SearchText}" class="search-container ng-pristine ng-valid" ng-submit="defaultSearch($event,'/search/search-result')" method="post" novalidate="">
<span></span>
<input data-ng-model="filter.SearchText" id="searchText" maxlength="200" type="text" class="form-control main-search-input ng-pristine ng-valid" placeholder="Search...">
<select id="searchInOption" data-ng-model="filter.SearchInOption" class="form-control main-search-option ng-pristine ng-valid">
<option value="0">All Content</option>
<option value="1">PDF Content</option>
<option value="2">Author Name</option>
<option value="3">Series Title</option>
<option value="4">Journal Title</option>
<option value="5">Book Title</option>
<option value="6">Grey Literature Title</option>
<option value="7">Publisher</option>
<option value="9">Key Words</option>
<option value="10">ISBN</option>
<option value="11">ISSN</option>
</select>
<button data-ng-click="defaultSearch($event,'/search/search-result')" id="btnSearch" type="submit" class="btn btn-search-icon" title="Search"><i class="fa fa-search"></i></button>
<a href="/search/advanced-search" class="btn btn-advance-search">Advanced Search</a>
<input name="__RequestVerificationToken" type="hidden" value="CfDJ8A_WV7JzZChKv7EfQMTQJyV1DsZ86_dJq4MPjWS8oWqz6MPr5xOR1ome7R_v1uKFXBrCD5rDPd8mf1b5C7rZfv-0-O1dnDflbFSyruzUnhaESJwnnZbb1Kho8sDo07CGsfOShmeaMVA7_ugBcJqr-xw">
</form>
Text Content
Cookies help us deliver our services. By using our services, you agree to our use of cookies. Learn more. I agree * Log In * Register All Content PDF Content Author Name Series Title Journal Title Book Title Grey Literature Title Publisher Key Words ISBN ISSN Advanced Search * MENU * Home * SUBJECT AREAS * PUBLISHERS * JOURNALS * eBooks * GREY LITERATURE * CEEOL-DIGITS * INDIVIDUAL ACCOUNT * Help * Contact * for LIBRARIANS * for PUBLISHERS Download CYBER ATTACK AGAINST E-ALBANIA AND ITS SOCIAL, ECONOMIC AND STRATEGIC EFFECTS CYBER ATTACK AGAINST E-ALBANIA AND ITS SOCIAL, ECONOMIC AND STRATEGIC EFFECTS Author(s): Aleksander Biberaj, Enida Sheme, Alban Rakipi, Sonila Xhaferllari, Renalda Kushe, Mirjeta Alinci Subject(s): Public Administration, Security and defense, ICT Information and Communications Technologies, Socio-Economic Research Published by: Acadlore Publishing Services Limited Keywords: Artificial intelligence; E-Albania; Electronic attack; Cyber security; Data base; HomeLand justice; Pattern behavior; Traffics malware; Summary/Abstract: During last years, even because of pandemic situation caused by covid-19 virus, in Albania most of governmental public services for citizens, businesses and other customers were offered in an electronic way by creating a national database (e-Albania), offering more than 2200 services. As this electronic system was newly implemented, time after time it was attacked from hackers in different sectors of services, causing the interruption of service for hours, downloading all the confidential information and publishing them. After several partial attacks, in July 2022 came the general attack of the whole system, which black out the system and services for several days. Cyber actors - identifying as “HomeLand Justice” - launched a destructive cyber-attack against e-Albania which rendered websites and services unavailable. An investigation indicates cyber actors acquired initial access to the victim’s network approximately 14 months before launching the destructive cyber-attack, which included a ransomware-style file encryptor and disk wiping malware. The actors maintained continuous network access for approximately a year, periodically accessing and exfiltrating e-mail content. From late July to mid-August 2022, social media accounts associated with HomeLand Justice demonstrated a repeated pattern of advertising Albanian Government information for release, posting a poll asking respondents to select the government information to be released by HomeLand Justice, and then releasing that information - either in a .zip file or a video of a screen recording with the documents shown. This cyber-attack creates social problems, economical loss and influenced negatively in the reputation of e-Albania and damage as well strategically the country and development of this sector in the future. Methodology: We have monitored the system and the attack, and we continue to do this. We analyze and synthesis the data collected, to come to conclusions and recommendations needed for the future. All the data which we have used are open for public, and mostly are primary data. The research method combines both quantitative and qualitative methods, but it is closer with qualitative method, as far as there in not enough data for using e pure quantitative analysis. We have used mostly the descriptive method. Results/Findings: Improving essentially the cyber infrastructure to avoid in the future such attacks with high social, economic and strategical cost. Conclusions: In the institution there was not a team for Cyber Security Monitoring the system, so called SOC (Security Operation Center), who controls in the real time all the logins. It was missing as well so called “Identifying Behavior”. There was not e separation of active directory, in physic machines and virtual machines, they were altogether. As the administrator had Full Right Privilege, the hacker doesn’t need to create a Privilege Escalation Vertical, so he easily took all the right of Admin. Originality and Practical Implications: The paper is original; it has not been previously published and it is not under consideration by any other publisher. The originality of the method stands in the fact that it is the first case in the world in information age, that a country (a whole electronic system, e-Albania), face a such complex, well organized and hard cyber-attack, which collapse the system for several days. All the data are authentic ones. * Details * Contents Journal: The Journal of Corporate Governance, Insurance, and Risk Management (JCGIRM) * Issue Year: 9/2022 * Issue No: 2 * Page Range: 341-347 * Page Count: 7 * Language: English * Content File-PDF Back to list RELATED CONTENT ABOUT CEEOL is a leading provider of academic eJournals, eBooks and Grey Literature documents in Humanities and Social Sciences from and about Central, East and Southeast Europe. In the rapidly changing digital sphere CEEOL is a reliable source of adjusting expertise trusted by scholars, researchers, publishers, and librarians. CEEOL offers various services to subscribing institutions and their patrons to make access to its content as easy as possible. CEEOL supports publishers to reach new audiences and disseminate the scientific achievements to a broad readership worldwide. Un-affiliated scholars have the possibility to access the repository by creating their their personal user account. CONTACT US Central and Eastern European Online Library GmbH Basaltstrasse 9 60487 Frankfurt am Main Germany Amtsgericht Frankfurt am Main HRB 102056 VAT number: DE300273105 Phone: +49 (0)69-20026820 Email: info@ceeol.com CONNECT WITH CEEOL * Join our Facebook page * Follow us on Twitter 2024 © CEEOL. ALL Rights Reserved. Privacy Policy | Terms & Conditions of use ver2.0.902 ×Close LOGIN CEEOL × Invalid username or password! Please check the fields below. Username (Email) Password My New User Account Forgot Password Register × Enter your Username (Email) below. Username (Email) Send Shibboleth Login Login Cancel