top of page
Cyberbugs provide VAPT Services , Security Services &  cyber securityTraining and ethical hacking training

COMMON CYBER ATTACKS

Updated: Mar 10, 2022


 COMMON CYBER ATTACKS


The purpose of common cyber attacks is accessing a computer network or system by cybercriminals, hackers or other digital adversaries, usually to alter, steal, destroy or expose data.


Cyberattacks can target a broad range of victims, including individuals, businesses, and even governments. goal of hackers when targeting businesses or other organizations is to gain access to sensitive and valuable company resources, such as intellectual property (IP), customer data, or payment information. Let's see some common cyber attacks.


common cyber attacks



1] Phishing:

===========


Hackers can steal user information using phishing fake pages such as number, address, username and passwords. Hackers can even make a fake banking portal, so that hackers can steal the whole amount in the victim's account.


Phishing accounts are mostly done using social engineering tricks that manipulate the human psychology to convince the victim to download any malignant file or link. When the victim downloads any malware, any Trojan, or any key-logger, the hacker can gain access to the device.


Hacker can use data such as user name, password, account number, and OTP if victim clicks on link and provides their personal information


The hacker can send these via SMS and email to the victims after they gather their number and email address.


2 MITM Attack:

=============


Malicious actors may use man-in-the-middle (MITM) attacks to intercept communications between network users and web applications. An MITM attack aims to steal information, such as personal data, passwords, or banking details, and/or to impersonate one party in order to gain further information or to spur action. A change in login credentials can be made, a transaction can be completed, or funds can be transferred.


Two common points of entry for MitM attacks:


1. Unsecured public Wi-Fi allows attackers to insert themselves between the device and the network. Without knowing, the visitor passes all information through the attacker.


2. After malware has compromised a device, an attacker can install software that will process all of the victim's data.



3] Zero-Day-Attack:

================


When a network vulnerability is announced, but there is no patch or solution implemented, there is a zero-day exploit. Attackers take advantage of this window of opportunity to execute their attack. A constant awareness of zero-day vulnerability threats is necessary.


4] DOS Attack:

=============


During a denial-of-service attack, systems, servers, or networks are flooded with traffic to exhaust resources and bandwidth. This prevents the system from fulfilling legitimate requests. Attackers can also use multiple compromise devices to launch this attack.


DOS attack is many types for example mass mailing sending lakhs of mail continuously, password dos attack, apache dos attack, network and system dos attack and so on


Dos attack is very dangerous hackers can shut down the server or slowing down the server. If dos attacked was perform any big organization and server are shutting down for only 1-2 hours c they loose millions of money.


5] Ransomware:

===============


Malware that encrypts files and prevents legitimate users from accessing their systems requires a ransom to be paid in order to regain access.Ransomware attacks exploit vulnerabilities in a computer system and gain access to its network. Once a computer system has been infected, the malware is able to either lock up the hard drive or encrypt its contents.


6] Malware:

===========

A malware attack is any program or code that is designed to damage a computer, network, or server. Malware is the most common kind of cyberattack. Malware is any software that poses a potential security risk to networks and computers such as spyware, ransomware, viruses, and worms. Malware infects a network via a vulnerability, often when a user clicks a dangerous link or email attachment which then installs risky software


7] SQL Injection:

==============


It is very dangerous vulnerability because if attacker gets any sql injection on any website URL or any website login and admin form attacker can inject the sql code and get data. It is very critical vulnerability where hacker could leak the data and sell the data online.


By inserting SQL code into a server, an attacker can force the server to reveal information it would not otherwise. This is termed a Structured Query Language (SQL) injection.


So, this was some best examples of common cyber attacks.



NOTE:There are many attacks attacker can perform rather than this common cyber attacks security is very very important nowadays technologies are increasing and cyber attacks also increased. you should aware from this cyber attacks and secure yourself and your organization.


As one of the biggest cybersecurity service providers and cybersecurity training providers in Nagpur, CyberBugs provides the best cybersecurity auditing service. Cyberbugs can audit your environment and perform vulnerability assessments and penetration tests on your platform to help secure it. vist our website cyberbugs.in



-By Abhishek Joshi






Recent Posts

See All
bottom of page