TYPES OF CYBER ATTACKS

by - June 22, 2020

TYPES OF CYBER ATTACKS

What Is A Cyber Attack?

Basically, a CYBER ATTACK is an attempt to gain unauthorised control over a computer system or network. A group of black hat hackers or a single hacker tries to breach the security of a computer system. This usually happens on a large scale. The purpose behind a CYBER ATTACK is to get financial benefit, to steal identity, etc.

TYPES OF CYBER ATTACKS:

  1. DICTIONARY ATTACK: We all use passwords in order to increase the security of a system. Dictionary Attack is like a guessing game which is used to crack passwords.
    Dictionary Attack
    The hackers used this method in order to get access to a system by guessing passwords. A program or a software is used in this method which contains all the common passwords that can be. The software tries every common password in order to get an unauthorised access. It is only useful against the users who use common passwords. There is another trick in this method. For this trick the hacker must have every single information about the user like name, birth date, any pet name, hobby, family member, career, etc. Then the hacker will input all the personal information into a script. The script will make a dictionary of every possible password using that information and will try to crack it. It is the most common and easy way to crack any password. 
    Phishing attack
    PHISHING ATTACK
  2. PHISHING: It is a well known method which is similar to actual fishing. In fishing, we use a bait(Chaara) to attract fishes and to capture them. Similarly, in this method a hacker uses a bait, i.e., he uses fake messages, emails or websites in order to attract and steal personal information like usernames, passwords, bank details, etc. These messages can be about winning big prizes, lucky draws, etc which looks legit. Sometimes these emails or messages may be about verifying about the user's bank details and it might look coming straight from the bank but these messages can be a trap. Instead of verifying the details the hacker will get hold of these sensitive data. Fake websites are made which would look normal to us. Like it is possible to create a fake facebook website, which looks exactly similar, asking your personal information like your account and password. But if you input your personal details it will be visible to the hacker who created the website. Other fake website seems to be coming from a trustworthy or famous source but you must be careful before sharing your personal details.
  3. DOS (Denial of service) and DDOS (Distributed denial of service) Attack: The aim of both attacks is same, which is, to increase the traffic on website to overload it with request for connection, etc. Until the server or website will not get down or beyond it's capacity resulting in shutting down of the website temporarily. For example, think of a normal road where vehicles are moving. If many vehicles try to move together at the same time it will create traffic as the road isn't wide enough to hold so many vehicles. Due to this, all the vehicles get block and the whole road becomes inactive. The difference: 'DOS Attack' is used against small and weak websites. A hacker uses a software which automatically sends innumerable request to get access to the websites. At a point the website cannot hold anymore request so it crashes and shuts itself down. On the another hand, 'DDOS Attack' is used against web servers of high-profile organizations such as banking, commerce, and media companies, or government and trade organizations. Also, DDOS Attack can be performed by a group of hackers. The target is a big and more secured website that is why to shut it down the hackers need to generate more traffic. For this, they first hack into many networking devices like mobile phone without the user's knowledge. It can be done by spreading malware about which you can read below. It creates a botnet, meaning a group of networking devices which are hacked and can be controlled by someone else. This botnet consist of millions of devices. Then the hackers use this botnet to bombard the website with innumerable request which crashes the website and now no one can access it. The reason behind carrying this attack may be to get extortion money or there might be competition between two organisation and by shutting one of the two websites will automatically attract more customers on the another one.    
  4.  MALWARE: A malware is any software which is designed to cause damage or corrupt a computer system, data, network, etc. It is used to carry out malicious activity. It enters a computer system without the knowledge of the owner. There are different types of malware with different purposes:
*In General usage we all use the term "computer virus"  include all forms of  "malware" ,or Malicious software.
  • VIRUS: Like a virus in real life, computer viruses are harmful for computers as they can corrupt the whole computer system. It can replicate itself and if not stop it would destroy the whole computer system. But computer virus aren't independent. It write its own code in the host Program or host computer. It cannot spread unless we try to spread it. If a file is Infected in a computer, sharing of that file to other computers will transmit the virus thereby damaging the other computer. Also, virus doesn't need human interaction to execute itself. Just after entering a system it begins to fulfill it's purpose. But some virus need to be open or run to execute the virus  Example - if a virus is embeded behind any software or a file the virus will not execute itself until the file is not opened. on the other hand there are some virus which execute itself after entering the system. 
  • WORMS: Unlike viruses a, computer worm is a complete and independent program. It can spread from computer to computer and will keep replicating itself. It spreads over a network and consumes the network resources to a large extent. Worms can enter a computer system as an attachment through spam emails, messages or someone might install thinking it as a boost for a computer system. Worms keep replicating itself  which leads to consumption of large resources such as transmission capacity, disk storage and denying services to others.
  • TROJAN: A Trojan is code a which can have various purposes like getting control over some of the computer systems, stealing data, stealing sensitive information, etc. A Trojan is not an independent malware. It needs to be executed by it's creator. It can enter your computer by fake emails, message, websites, software which looks authentic and trustworthy.
  • SPYWARE: You might know about the different spy movies where a spy keeps an eye on a particular target and sends every single information about it to his boss. Similarly, a Spyware when enters a computer system, it sends all its sensitive data to it's creator like Browsing history, cookies, location, system information, company details, etc. It keeps an eye on all the activities of the user without his or her knowledge. But a Spyware can never gain control over a system.
  • RANSOMWARE: Ransomware is like kidnapping. A kidnapper kidnaps someone and then he asks for ransom or a payment for the victim's freedom. Similarly, in a Ransomware attack, when a malicious software enters a computer system it encrypts all the data in the computer. Meaning it locks the complete data of the computer which makes it impossible for the user to get an access to that data. This software can enter your computer system through a fake email, while visiting an infected site, when you install an unknown software, etc. All these methods look very trustworthy and legit. This encryption or lock can only be opened with a type of subscription key. The hacker sends a message to the owner that if he/she wants the key to get access the data, a ransom must be paid for it mainly through an untraceable bitcoin payment. After the payment the owner gets the key with which he/she can access the computer again.   

You May Also Like

0 comments