New Microsoft Word Document
New Microsoft Word Document
The motivations behind cyberattacks can vary, but there are three main
categories:
1. Criminal
2. Political
3. Personal
Criminal organizations, state actors, and private persons can all start
cyberattacks. One way to classify threat actors is by categorizing them as
outsider threats or insider threats.
Insider threats are users who have authorized and legitimate access to
a company’s assets and misuse their privileges deliberately or
accidentally. This category includes employees, business partners, clients,
contractors, and suppliers with system access.
While negligent users can put their companies at risk, it’s only a
cyberattack if the user intentionally uses their privileges to carry out
malicious activity. An employee who carelessly stores sensitive
information in an unsecured drive isn’t committing a cyberattack — but a
disgruntled employee who knowingly makes copies of confidential data for
personal gain is.
What do cyberattacks target?
Threat actors typically break into computer networks because they’re
after something specific. Common targets include:
Money
Businesses' financial data
Client lists
Customer data, including personally identifiable information (PII) or
other sensitive personal data
Email addresses and login credentials
Intellectual property, like trade secrets or product designs
In some cases, cyberattackers don’t want to steal anything at all. Rather,
they merely want to disrupt information systems or IT infrastructure to
damage a business, government agency, or other target.
What effects do cyberattacks have on businesses?
Social engineering attacks manipulate people into doing things that they
shouldn’t do, like sharing information they shouldn’t share, downloading
software they shouldn’t download, or sending money to criminals.
The difference between DoS attacks and DDoS attacks is simply that DoS
attacks use a single source to generate fraudulent traffic, while DDoS
attacks use multiple sources. DDoS attacks are often carried out with a
botnet, a network of internet-connected, malware-infected devices under
a hacker's control. Botnets can include laptops, smartphones, and Internet
of Things (IoT) devices. Victims often don't know when a botnet has
hijacked their devices.
Account compromise
Account compromise is any attack in which hackers hijack a legitimate
user's account for malicious activity. Cybercriminals can break into a
user's account in many ways. They can steal credentials through phishing
attacks or buy stolen password databases off the dark web. They can use
password attack tools like Hashcat and John the Ripper to break password
encryptions or stage brute force attacks, in which they run automated
scripts or bots to generate and test potential passwords until one works.
Man-in-the-middle attacks
Hackers may read a user's emails or even secretly alter the emails before
they reach the recipient. In a session hijacking attack, the hacker
interrupts the connection between a user and a server hosting important
assets, like a confidential company database. The hacker swaps their IP
address with the user's, making the server think they're a legitimate user
logged into a legitimate session. This gives the hacker free rein to steal
data or otherwise wreak havoc.
Supply chain attacks
For example, in 2020, Russian state actors hacked the software vendor
SolarWinds and distributed malware to its customers under the guise of a
software update (link resides outside ibm.com). The malware allowed
Russian spies to access the sensitive data of various US government
agencies using SolarWinds' services, including the Treasury, Justice, and
State Departments.
Other types of cyberattacks
Cross-site scripting (XSS)
Cross-site scripting (XSS) attacks insert malicious code into a legitimate
web page or web application. When a user visits the site or app, the code
automatically runs in the user's web browser, usually stealing sensitive
information or redirecting the user to a spoofed, malicious website.
Attackers frequently use JavaScript for XSS attacks.
SQL injection
SQL injection attacks use Structured Query Language (SQL) to send
malicious commands to a website's or app's backend database. Hackers
input the commands through user-facing fields like search bars and login
windows. The commands are then passed to the database, prompting it to
return private data like credit card numbers or customer details.
DNS tunneling
DNS tunneling hides malicious traffic inside DNS packets, allowing it to
bypass firewalls and other security measures. Cybercriminals use DNS
tunneling to create secret communication channels, which they can use to
silently extract data or establish connections between malware and a
command and control (C&C) server.
Zero-day exploits
Zero-day exploits take advantage of zero-day vulnerabilities, which are
vulnerabilities either unknown to the security community or identified but
not yet patched. These vulnerabilities can exist for days, months, or years
before developers learn about the flaws, making them prime targets for
hackers.
Fileless attacks
Fileless attacks use vulnerabilities in legitimate software programs to
inject malicious code directly into a computer's memory. Cybercriminals
often use PowerShell, a scripting tool built into Microsoft Windows
operating systems, to run malicious scripts that change configurations or
steal passwords.
DNS spoofing
DNS spoofing attacks, also called "DNS poisoning," covertly edit DNS
records to replace a website's real IP address with a fake one. When
victims try to visit the real site, they're unknowingly delivered to a
malicious copy that steals their data or spreads malware.
Cyberattack prevention, detection, and response
Organizations can reduce cyberattacks by implementing cybersecurity
systems and strategies. Cybersecurity is the practice of protecting critical
systems and sensitive information from digital attacks by using a
combination of technology, people, and processes.
Preventing cyberattacks
Firewalls can help block threat actors from entering the network in
the first place. Firewalls can also block malicious traffic flowing out
of the network, such as malware attempting to communicate with a
command and control server.