Disclaimer: This does not include all major cyber attacks because there are many new attacks carried out every day by influential countries and by small criminal groups. The main goal for many of these major attacks involves stealth, this means many attacks are happening currently without the knowledge of the victim(s).
This timeline of about 20 years looks into some of the biggest and most damaging cyber attacks on a national and global scale. Along with the attacks, it also gives the name and description of each attack. Looking at the descriptions, you can see somewhat of an idea of how hacking organizations have developed different technologies, or how they have improved previous methods. This also shows a wide variety of technologies and what kind of damage they caused and to whom was effected.
Over the last five years, the IC3 has received an average of 652,000 complaints per year. These complaints address a wide array of Internet scams affecting victims across the globe.
The flow of cyber crime can very based on the technology and software that the hackers use, however this is a good general example of how cyber crime happens. First, they must gain entry into a system. In this case is phishing, most likely through email. Next they use software to establish a foothold into the system they cracked. Once hackers have system access and a foothold, they move into the gathering phase, which is the cycle shown above. Once fully done gathering intelligence, in most cases, hackers will remove their software or malware from the device that was compromised. As said earlier, this is a very general cycle, steps can be added or taken away depending on hacking and security system capabilities.
Can the U.S. disrupt the flow of cyber attacks?
If the U.S. could disrupt the flow, how would that happen?
If the U.S. couldn't disrupt the flow, could that be a possibility?
Could a software be developed to slow down the process of entry into government systems?