2- Cybersecurity-Awareness-Presentation-17-May-22
2- Cybersecurity-Awareness-Presentation-17-May-22
G.S. Oreku
Types of Cyber Attacks
2023
1
What is Cyber Attacks?
When there is an unauthorized system/network
access by a third party, we term it as a cyber
attack. The person who carries out a cyberattack
is termed as a hacker/attacker.
3
Why do people launch Cyber
Attacks ?
4
What happens During Cyber
Attacks ?
5
How do Cyber Attacks
happens ?
6
What is Botnet?
7
Malware Attack?
This is one of the most common types of cyberattacks. “Malware” refers to malicious
software viruses including worms, spyware, ransomware, adware, and trojans.
The trojan virus disguises itself as legitimate software. Ransomware blocks access to
the network's key components, whereas Spyware is software that steals all your
confidential data without your knowledge. Adware is software that displays advertising
content such as banners on a user's screen.
Malware breaches a network through a vulnerability. When the user clicks a dangerous
link, it downloads an email attachment or when an infected pen drive is used.
Phishing attacks are one of the most prominent widespread types of cyberattacks. It is
a type of social engineering attack wherein an attacker impersonates to be a trusted
contact and sends the victim fake mails.
Unaware of this, the victim opens the mail and clicks on the malicious link or opens
the mail's attachment. By doing so, attackers gain access to confidential information
and account credentials. They can also install malware through a phishing attack.
9
Password Attack?
It is a form of attack wherein a hacker cracks your password with various programs
and password cracking tools like Aircrack, Cain, Abel, John the Ripper, Hashcat, etc.
There are different types of password attacks like brute force attacks, dictionary
attacks, and keylogger attacks.
10
Man-in-the-Middle Attack?
As seen below, the client-server communication has been cut off, and instead, the
communication line goes through the hacker.
11
SQL Injection Attack?
This results in the attacker being able to view, edit, and delete tables in the databases.
Attackers can also get administrative rights through this.
12
Denial-of-Service Attack?
When this happens, catering to the incoming requests becomes overwhelming for the
servers, resulting in the website it hosts either shut down or slow down. This leaves
the legitimate service requests unattended.
As the name suggests, an insider threat does not involve a third party but an insider.
In such a case; it could be an individual from within the organization who knows
everything about the organization. Insider threats have the potential to cause
tremendous damages.
Insider threats are rampant in small businesses, as the staff there hold access to
multiple accounts with data. Reasons for this form of an attack are many, it can be
greed, malice, or even carelessness. Insider threats are hard to predict and hence
tricky.
Depending on the vulnerability, the vendor or the developer could take any amount of
time to fix the issue. Meanwhile, the attackers target the disclosed vulnerability. They
make sure to exploit the vulnerability even before a patch or solution is implemented
for it.
The victim here is a particular group of an organization, region, etc. In such an attack,
the attacker targets websites which are frequently used by the targeted group.
Websites are identified either by closely monitoring the group or by guessing.
After this, the attackers infect these websites with malware, which infects the victims'
systems. The malware in such an attack targets the user's personal information. Here,
it is also possible for the hacker to take remote access to the infected computer.
Let's now see how we can prevent the watering hole attack:
Update your software and reduce the risk of an attacker exploiting vulnerabilities.
Make sure to check for security patches regularly.
Use your network security tools to spot watering hole attacks. Intrusion prevention
systems(IPS) work well when it comes to detecting such suspicious activities.
To prevent a watering hole attack, it is advised to conceal your online activities. For
this, use a VPN and also make use of your browser’s private browsing feature. A
VPN delivers a secure connection to another network over the Internet. It acts as a
shield for your browsing activity. NordVPN is a good example of a VPN. 17
Contin…
Spoofing
Identity-Based Attacks
Perform to steal or manipulate others' personal information, like login someone's PINs to
steal unauthorized access to their systems.
Performed by inserting malicious code into a software application to manipulate data. For
example, the attacker puts malicious code into a SQL database to steal data.
Attacker uses the Domain Name System (DNS) to bypass security measures and
communicate with a remote server.
DNS Spoofing
Cyberattack in which an attacker manipulates the DNS records from a website to control its
traffic.
IoT-Based Attacks
Exploit vulnerabilities in the Internet of Things (IoT), like smart thermostats and security
cameras, to steal data.
Ransomware
19
Contin…
Distributed Denial of Service (DDos) Attacks
Flood a website with traffic to make it unavailable to legitimate users and to exploit
vulnerabilities in the specific network.
Spamming
Hackers get close to a bank's computer systems to withdraw large amounts of cash from
ATMs.
Whale-Phishing Attacks
Target specific individuals or groups under an organization. Attackers use social engineering
techniques to get sensitive information.
URL Interpretation
A web browser interprets a URL (Uniform Resource Locator) and requests the corresponding
web page to exploit vulnerabilities in the URL interpretation.
Session Hijacking
The hacker gets access to a user's session ID to authenticate the user's session with a web
application and take control of the user's session.
An attacker gets unauthorized access to a system by trying various passwords until the
correct one is found. It can be highly effective against weak passwords.
21
Contin…
Web Attacks
Targets websites and can insert SQL injection, cross-site scripting (XSS) and file inclusion.
Trojan Horses
Malware that appears to be a legitimate program but which contains malicious code. Once
installed, it can perform malicious actions like stealing data and controlling the system.
Drive-by Attacks
The user's system is flooded with malware by visiting its compromised website to exploit
vulnerabilities in other software to insert the malware without the user's knowledge.
An attacker inserts unauthorized code into a legitimate website to access the user's information
to steal sensitive information like the user's passwords and credit card details.
22
Contin…
Eavesdropping Attacks
Birthday Attack
A cryptographic attack exploits the birthday paradox to access a collision in a hash function. The
attacker successfully generates two inputs to get the same output hash value. This can be used
to compromise to bypass access controls.
Volume-Based Attacks
The attacker floods a system with heavy data to make it inaccessible to legitimate users. For
instance, DDoS attacks in which various compromised computers flood a specific website with
traffic to crash it.
Protocol Attacks:
Targets the application layer of a system, aiming to exploit vulnerabilities in applications or web
servers.
Dictionary Attacks
An attacker attempts to guess a user's password by trying a list of common words. This attack
becomes successful because many users use weak or easy passwords.
Virus
Malicious software can replicate itself and spread to other computers. Viruses can cause
significant damage to systems, corrupt files, steal information, and more.
Worm
Replicates itself and spreads to other computers, but unlike viruses, worms don't require human
interaction. 24
Contin…
Backdoors
This vulnerability allows attackers to bypass standard authentication procedures and gain
unauthorized access to a system or network.
Bots
These software programs automate network or internet tasks. They can be used for malicious
purposes, such as Distributed Denial of Service (DDoS) attacks.
Targets businesses and organizations by using email. The attackers impersonate a trusted source
to trick the victim into transferring funds or sensitive information to the attacker.
Targets web applications by injecting malicious code into a vulnerable website to steal sensitive
information or to perform unauthorized attacks.
25
Contin…
AI-Powered Attacks
Use artificial intelligence and machine learning to bypass traditional security measures.
Rootkits
Provide attackers privileged access to a victim's computer system. Rootkits can be used to hide
other types of malware, such as spyware or keyloggers, and can be challenging to detect and
remove.
Spyware
Is malware designed to collect sensitive information from a victim's computer system. This can
include passwords, credit card numbers, and other sensitive data.
Social Engineering
Is a malware designed to capture keystrokes a victim enters on their computer system. This can
include passwords, credit card numbers, and other sensitive data.
Botnets
Are networks of compromised computers controlled by a single attacker. Botnets can launch
distributed denial of service (DDoS) attacks, steal sensitive information, or perform other
malicious activities.
Emotet
Adware
Is malware that displays unwanted advertisements on a victim's computer system. Adware can 27
be annoying and disruptive, but it's generally less harmful than other types of malware.
Contin…
Fileless Malware
Doesn’t rely on files to infect a victim's computer system. Instead, fileless malware executes
malicious code using existing system resources, such as memory or registry keys.
Target individuals or organizations using highly targeted and personalized emails. Angler
phishing attacks can be difficult to detect and are often successful in stealing sensitive
information.
28
Current state of
Cybersecurity
29
Cost of Cybersecurity Attacks
30
Phishing Attacks
Phishing emails
e.g. COVID 19 vaccines
Vishing
e.g. Computer technician call to
fix a virus on your machine
Smishing
e.g. TRA text messages to claim a
tax refund
31
Phishing Examples
Phishing Examples
Ransomware
Type of malware that encrypts data specifically
asking for payment in order to restore access.
How? Protect
Yourself
Email Regular backups
attachments
Website Updates
downloads
• Everything is CONNECTED!
• Personal documents
• Identity
• Finances
• Digital footprint
35
How can I protect
myself?
Passwords
1. Phishing - email
2. Vishing – phone call
3. Smishing – text messages
• Privacy controls
• Be mindful of what you share
• Review app privacy collection
Creating a Cyber secure home checklist
• Scamwatch
• Stay Smart Online
• SANS Security Awareness Blog
Thank you!