Introduction to Cyber Attack
A cyber attack is a deliberate attempt to breach computer systems or networks by using malicious software to disrupt the system. It can be launched from one or more computers against one or multiple computer networks. Cyber attacks lead to practices like fraud, information theft, ransomware schemes, etc.
Types of Cyber Attacks
Common Types of Cyberattacks are as follows:
Malware is short-term for Malicious Software, including viruses, worms, spyware, trojans, and ransomware. When the user clicks on a malicious link or an email attachment, it gets installed on the system. Once it is installed on the system, it can do harmful activities such as Blocks access to the data and programs on the system, Steals information.
E.g. of, Malware is Ransomware. It encrypts data on the victim’s system and then demands a ransom in exchange for decryption, which makes the system usable again or access to the blocked data.
Phishing attempts to steal sensitive information like usernames, passwords, bank account details or to install malware by using emails that appear to be from a trusted source. It starts to work when the target user opens the link from an email and provides login details or other private information to the fake source.
E.g., Phishing websites. After that, the attacker collects these credentials and uses them on a legitimate website for harmful actions. This works just like a fisherman uses bait to catch a fish.
3. Denial of Service (DOS) and Distributed DOS (DDOS) Attack
A Denial of Service attack floods networks, servers, or surrounding infrastructure with traffic to consume bandwidth and resources. After the specific time and traffic server can no longer effectively process incoming requests, it denies other incoming request services.
E.g., This makes the server unavailable to legitimate requests. A DOS attack was performed on one computer and one internet connection to flood the target server. DDOS, which is short for Distributed DOS, is an attack that takes place from multiple computers and multiple internet connections. i.e. distributed sources such as a botnet.
4. SQL Injection
Sequel injection is also called as SQLi. SQL is a programming language used for maintaining the database. The main motive of an attacker to perform SQL injection is to retrieve or modify data from the SQL database. An attacker can execute commands by inserting specialized SQL statements into the input fields of the website. If the website is vulnerable to SQL Injection, the attacker can read sensitive data from the database and manipulate the queries by giving commands such as INSERT, UPDATE, DELETE. Also, a hacker can execute the system admin operations, shut down the database, or give commands to the operating system.
E.g., There is a web form on the website which requests a user’s account details. Hence the code for this query will be like as follows:
userID = getRequestString("userID");
lookupUser = "SELECT * FROM users WHERE userID = " + userID
If the user provides ID as 112 in the input areas of the website, then the resulting query will be as follows:
"SELECT * FROM users WHERE userID = '112';"
For SQL Injection, an attacker will provide input such as 112 OR 1=1
Therefore, in SQL Database, this will get executed as
"SELECT * FROM users WHERE userID = '112' OR '1'='1';"
The logic behind this is ‘1’=’1′ is always results in TRUE so that the database will return all users’ data but not a single user.
5. Man In The Middle(MITM) Attack
In MITM, the attacker places himself between the two parties, i.e. the sender and receiver, to intercept or manipulate the communication between them. By doing this, an attacker can collect information and impersonate any of the parties.
E.g., A and B are communicating with each other. A sends some message to B, but before it transfers to B, attacker which impersonates himself between the communication, receives that message and can read or edit the private message and sends that modified message to B. B is unaware of the modification, and he believes this message is sent by A.
6. Cross-site Scripting(XSS) Attack
7. Eavesdropping attack
This attack happens when there is an interception of network traffic. Through this attack, the attacker can access the bank account, credits, and other private information.
There are two types of Eavesdropping attacks.
- Active Eavesdropping: In this, hacker gathers information by actively participating in communication like scanning the network ports, tampering with HTTP requests, etc.
- Passive Eavesdropping: This involves information gathering by secretly listening to communications.
Detecting Passive eavesdropping is harder than active ones because there are no backtracks to trace in passive eavesdropping.
An example of Eavesdropping is as follows:
The attacker will contact a person through an email as a bank manager and sends a message to him such as, because of a server issue, we are updating our system servers, please provide your bank details. As soon as a person sends his personal details to that mail, the attacker will access his account.
Different Ways to protect yourself from cyber attacks
- Do not share personal information online unless you’re sure about the authentication of a legitimate website. Also, change passwords regularly. Make sure that you’re not using the same password on different websites.
- Make sure that you are using a website that starts with a Secure HTTP(https) extension.
- Always download and install software updates for your operating system.
- Secure Wi-Fi networks and control access to hardware systems also.
- In organizations, train employees about cyber threats and how to avoid them. Limit employees to access information and authority for installation of software.
- Limit access to the database. Also, restrict permission to update or modify a database other than a system admin.
- Back up your files at least once per week. Save backup files to a removable hard disk or a cloud if it is possible to encrypt them with a strong encryption algorithm.
This has been guided to What is Cyber Attack. Here we discuss different types and how to protect yourself from cyber-attacks. You can also go through our other suggested articles to learn more –