Cyber Attack Definitions

836ef46e-d345-4075-a8cb-80718c6c2f78

Email Threats

Phishing
The most common type of phishing scam, deceptive phishing refers to any attack by which fraudsters impersonate a legitimate company and attempt to steal people's personal information or login credentials. Those emails frequently use threats and a sense of urgency to scare users into action.

For example, PayPal scammers might send out an attack email that instructs them to click on a link in order to rectify a discrepancy with their account. In actuality, the link leads to a fake PayPal login page that collects a user’s login credentials and delivers them to the attackers.

Spear Phishing
Not all phishing scams lack personalization – some use it quite heavily.
For instance, in spear phishing scams, fraudsters customize their attack emails with the target’s name, position, company, work phone number and other information in an attempt to trick the recipient into believing that they have a connection with the sender.
The goal is the same as deceptive phishing: lure the victim into clicking on a malicious URL or email attachment, so that they will hand over their personal data.
Spear-phishing is especially commonplace on social media sites like LinkedIn, where attackers can use multiple sources of information to craft a targeted attack email.

Malware attacks

Malware is a broader term for several types of malicious codes created by cybercriminals for preying on online users. Malware is the singly coined word for the words, “Malicious Software”. Today, the cyber attacks have become more common and frequent, targeting small to big organizations. The motive behind the creation of such unlawful programs is to gain illegal access to computing devices, steal personal information, spy without the user intent and much more.
With the rise of malware attacks, it becomes mandatory to know and understand their types, attacking methodologies, detection, and malware removal procedures to stay protected.
 
Types of Malware:
 
Computer Virus
Created to relentlessly self-replicate it infects programs and files. The malicious activities may be targeted at destroying valuable data or causing unrepairable damages.
Spyware
The name says it all, the software is created to spy on the victim so, it is secretly implanted on the computing device by the hacker. The spyware gathers information and sends it to the hacker.
Adware
The malicious program is devised to pop-up unwanted advertisements on the victim’s computer without their permission. The pop-ups are uncontrollable and tend to behave erratically, they usually appear numerous times on the screen and it becomes tedious to close them.
Rootkit
Rootkit Virus assists a hacker in remotely accessing or controlling a computing device or network without being exposed. They are hard to detect due to the reason that they become active even before the system’s Operating System is booted up.
Trojan Horse
The name “Trojan horse” arrives from the ancient Greek tale on Trojan War. Similar to the story, the malicious program sneaks into the victim’s computer disguised as a legitimate program that users will accept and want to use.
Worm
The Worm Virus is a malicious code that copy’s itself and spreads to other computers. The Worm makes use of the network to spread to other devices. An infected network or system may slow down and face unexpected hiccups on the full-swing. While a Computer Virus attaches itself to different programs and executable codes, the Worm Virus spreads across the networks, this is the notable difference between the two.
Ransomware
As the name interprets, the ransomware is a ransom malware. The ransom virus blocks the user from accessing the files or programs and the virus removal demands to pay the ransom through certain online payment methods. Once the amount is paid the user can resume using their system.
Keylogger
The Keylogger records every keystroke that a user makes on their device by running in the background. It steals user credentials and confidential data and forwards it to the hacker for malicious purpose.
Botnet
The cybercriminal blocks a user actions and takes full control of the system. The hacker creates a network of malware-infected computers which functions as a bot. The botnet virus is used to transmit malware, send spam emails, and execute other malicious tasks.