Cyber Threat
Cyber Threat
Title
No.
1. What is Cyber Threat?
2. Where do cyber threats come from?
3. Types of Cyber Threats
4. Consequences of Cyberattacks on Industries
5. Top Cyber Attack in History
6. Introduction to Cyber Security
7. Need of cyber security
8. Critical Components of a Cybersecurity Strategy
9.
Trends Changing Cyber Security
10. AI in Cybersecurity
11.
Advanced Threat Detection
12.
Cyberattack & their remedies
13.
References
Criminal organizations
Organized groups of hackers aim to break into organizations for financial gain.
These cyber threat actors use phishing, spam, spyware, and malware for
extortion, theft of private information, and online scams that are run like
corporations, with large numbers of employees developing attack vectors and
executing attacks
Nation-states
Hostile countries can launch cyber attacks against local companies and
institutions to interfere with communications, cause disorder, and inflict
damage.
Terrorist organization
Terrorists conduct cyber attacks aimed at destroying or abusing critical
infrastructure, threatening national security, disrupting economies, and causing
bodily harm to citizens
Hacktivists
Hacktivists activities range across political ideals and issues. Most hacktivist
groups are concerned with spreading propaganda rather than damaging
infrastructure or disrupting services. Their goal is to support their political
agenda rather than cause maximum damage to an organization.
Hackers
Individual hackers target organization using a variety of attack techniques.They
are usually motivated by personal gain, revenge, financial gain, or political
activity .Hackers often develop new threats, to advance their criminal ability
and improve their personal standing in the hacker community.
Rogue insiders
Employees with legitimate access to company assets abuse their privileges to
steal information or damage electronic assets for economic or personal gain.
This insider threats may be the target organization's employees, contractors,
suppliers, or partners.
Fig .1. Sources of cyber security
1. Malware attacks
Virus: This type of malware attaches itself to clean files and spreads throughout
a computer system as those files are executed. It can quickly corrupt or delete
data on a device.
Worm: Worms infect entire networks of devices either by local networks or
through the internet. They operate by exploiting vulnerabilities in operating
systems.
Trojan: Unlike viruses, Trojans don't replicate themselves, but they can be just
as destructive. They disguise themselves as legitimate software but act
maliciously once inside the device.
Spyware: As its name implies, this type of malware spies on users. It can gather
data like user habits, logins, credit card information, and other personal details.
It is designed to steal private information from a computer system for a third
party. It collects information and sends it to the hacker, often without the users
knowledge.
Ransomware: This malware locks and encrypts a victims data , system or file
rendering them unusable until the attackers receive a ransom payment and
demands payment (ransom) to restore access.
Adware: It displays unwanted ads and pop-ups on the computer. It often comes
bundled with software downloads and generates revenue for the software
distributor by displaying ads.
Mobile Malware: As mentioned in the article snippet you provided, this targets
mobile devices and can include a range of malicious code types tailored for this
department.
Fig.3.Types of Malware
b. Vishing (voice phishing): The imposter uses the phone to trick the target
into disclosing sensitive data or grant access to the target system. Vishing
typically targets older individuals but can be employed against anyone.
c. Smishing (SMS phishing): The attacker uses text messages as a means of
deceiving the victim.
HTTPS Spoofing: The attacker tricks the victim into believing their connection
is secure by substituting a fake SSL/TLS certificate.
ARP Spoofing: Sends fake ARP messages to associate the attacker’s MAC
address with a target IP, intercepting local network traffic.
Wi-Fi MITM (Evil Twin Attack): Creates a fake Wi-Fi hotspot to intercept
communications from connected devices.
Replay Attacks: Captures and retransmits valid data to repeat actions or disrupt
communication.
SQL Injection (SQLi): Attackers insert malicious SQL queries into input fields
to manipulate databases and can result in unauthorized data access, deletion, or
modification.
Code Injection: Attackers inject executable code into an application and can
modify the behavior of software or execute unauthorized functions.
1. Financial Losses
The financial impact of a cyberattack can be devastating for businesses.
Immediate costs include remediation efforts, such as hiring cybersecurity
experts, recovering or replacing compromised systems, and potential ransom
payments. Long-term costs may involve lost revenue due to downtime, legal
fees, and fines for non-compliance with data protection regulations.
2. Reputation Damage
A cyberattack can severely damage a company’s reputation, leading to a loss of
trust among customers, partners, and investors. This can result in lost business,
as well as difficulties in attracting new customers or securing investments.
3. Operational Disruptions
Cyberattacks can cause significant operational disruptions, such as systems
downtime or loss of critical data. These disruptions can hinder a company’s
ability to deliver products and services, affecting customer satisfaction and
potentially leading to contractual penalties.
1. From April 27, 2007 Estonia, the European country faced the series of
cyber attack that lasted for weeks
The NASA Cyber Attack took place in the year 1999 which
caused a three-week computer shutdown in NASA, all of
the systems that were used in NASA were shut down by
this Cyberattack. This attack was launched by a 15-
year-old boy from Florida named jonathan james who
used the internet name “comrade”.
1. Jonathan James who used the internet name “c0mrade”.
At first, he penetrated the US Department of Defence’s
computers and
At first, he penetrated the US Department of Defence’s computers
and he installed a backdoor on the servers which
allowed him to intercept thousand of official
government emails including usernames and
passwords.
The backdoor helped James steal NASA software and
then crack the computers at NASA which cost NASA a
loss of $41,000 as the systems were shut down for
three weeks.
Jonathan James was the first person to carry out a hack
against NASA.
Later in 2000 James was arrested from his home in
Florida and was sentenced to seven months of house
arrest until he was 18.
In the year 2013, Adobe witnessed one of the biggest data breach
cyberattacks. The attackers stole the usernames and passwords of almost 30
million users and also stole 3 million credit card details, they also breached
almost 150 million accounts worldwide.
One of the reasons why attackers were able to steal the information so
easily was the shifting of Adobe to cloud services which made adobe
vulnerable.
Other mistakes that led to these attacks were that Adobe used the same
encryption key for a similar password which means if more than one user
has the same password, obtaining the password of just one is sufficient to
breach other accounts as well.
The hackers also stole the source codes for Adobe Acrobat, Photoshop, and
Coldfusion. The attackers used the vulnerabilities such as usage of Block
cipher to get the user credentials, they also used the hints that were set by
the users to steal the passwords and other confidential information from the
users.
Cyber Security
CYBER SECURITY
cyber security
(computer system (system security/ network security
network program or data) program or data security)
Also, it protects digital system ,networks and data from unauthorized access,
theft or damage. It involves implementing various measures and technologies to
ensure the confidentiality, integrity and availability of information stored and
processed on computer system. Three critical aspects of cyber security are:
1. Prevention: Implementing security measures to prevent unauthorized
access or breaches.
2. Detection: Identifying potential threats and vulnerabilities in a system.
3. Response: Taking necessary actions to mitigate the impact of a security
incident.
Need of cyber security
1. To protect private data
2. To protect intellectual data
3. To protect banking and financial data
4. National security
5. Global security
6. Protect sensitive data
Here mentioned below are some of the trends that are having a huge impact on
cyber security.
Web servers: Data-stealing attacks, many of which get the attention of media,
are also a big threat. Now, we need a greater emphasis on protecting web
servers and web applications. Web servers are especially the best platform for
these cyber criminals to steal the data. Hence one must always use a safer
browser especially during important transactions in order not to fall as a prey
for these crimes.
Computing and its services: This latest trend presents a big challenge for
cyber security, as traffic can go around traditional points of inspection .
Additionally, as the number of applications available in the cloud grows, policy
controls for web applications and cloud services will also need to evolve in
order to prevent the loss of valuable information.
Mobile Networks: Further mobile networks are highly prone to these cyber
crimes a lot of care must be taken in case of their security issues. Mobile
networks Today we are able to connect to anyone in any part of the world. But
for these mobile networks security is a very big concern.
AI in Cybersecurity
AI is revolutionizing cybersecurity by enhancing threat detection, prevention,
and response. Unlike traditional systems, AI leverages advanced data analysis,
machine learning (ML), and neural networks to identify patterns, detect
anomalies, and predict potential attacks.
1. Phishing Attacks
Remedies:
2. Ransomware Attacks
Remedies:
Remedies:
4. Insider Threats
Remedies:
Restrict access to critical data based on job roles (least privilege principle).
Remedies:
Remedies:
7. Zero-Day Exploits
Remedies:
Remedies:
Use parameterized queries and input validation.
9. Credential Stuffing
Remedies:
References:
1. https://www.spiceworks.com/it-security/vulnerability-management/
articles/what-is-cyber-threat/
2. https://preyproject.com/blog/what-are-cyber-threats-how-they-affect-you-
what-to-do-about-them
3. https://www.crowdstrike.com/en-us/cybersecurity-101/social-
engineering/types-of-social-engineering-attacks/
4. https://www.nu.edu/blog/what-is-cybersecurity/#:~:text=Cybersecurity
%20protects%20digital%20systems%2C%20networks,and%20processed
%20on%20computer%20systems.
5. https://www.ibm.com/think/topics/cyberthreats-types
6. https://www.researchgate.net/publication/
260126665_A_Study_Of_Cyber_Security_Challenges_And_Its_Emergin
g_Trends_On_Latest_Technologies