Cyberattacks
Last updated
Was this helpful?
Last updated
Was this helpful?
A cyberattack refers to any deliberate attempt by an individual or group to compromise the confidentiality, integrity, or availability of information, systems, or networks.
Cyberattacks can range from highly targeted, sophisticated intrusions to broad, automated attacks, and they can be driven by various motives, such as financial gain, espionage, activism, or even sabotage.
Normally, attacks follow a specific flow with phases that an attacker goes through to successfully execute an attack. A possible way to generalize the principal stages is:
Information Gathering: Collecting as much publically accessible information about a target/organization as possible
Enumeration: Discovering applications and services running on the systems
Exploitation: Leveraging vulnerabilities discovered on a system or application
Privilege Escalation: Attempt to expand the access and privileges on a system
Post-exploitation: After getting access we perform pivoting, get additional information that can be gathered, cover the access tracks, and report the vulnerabilities
Attacks can also be categorized based on their impact or shape upon completion. Some common categories are:
Passive: Is focused on monitoring and interception of data flows through network traffic
Active: Data tampering, corruption, extraction, or disruption of communication between secured systems
Close-in: The attacker is in close physical proximity to the objective target. Normally focused on gathering, modification, or disruption of access to a system's information
Insider: These are performed by trusted persons using privileged access to violate rules or intentionally cause a threat
Distribution: Tampering with hardware or software before installation
Also, the attacks are typically classified into different types based on their methods and goals. Some of these types are:
Spoofing: A networked device pretends to identify as another using its MAC address
On-path: Intercept or modify communications between two devices
Tampering: Action of manipulating a system by making changes to data that you should not, trying to damage and deteriorate it
Brute-Forcing: Attack based on trying all the possible combinations till finding one who gains access to a system
DOS: Denial Of Service attack, cause that services can't be obtained from legitim users in a part or the entire network
Reflected DOS: Use another target as an intermediary sending the packets first to this and that it sends the petitions to do the actual DOS attack
Amplified DOS: Attacks send packets where the response traffic is made up of packets that are much larger than those that were initially sent. Usually done by sending DNS queries to a DNS server which replies with larger packets to the victim
DDOS: Distributed Denial Of Service attack, originates from multiple, coordinated sources to generate a massive DOS attack
MItM: Man In The Middle, the attacker can get, insert, and modify data in the communication between two machines of a network. Consist in message interception without getting detected by a system
MItMo: Man In The Mobile, can spy on application behavior, SMS, or voice calls from a phone and relay back data to a hacker
Injection: Insertion of packages, malicious or unauthorized code as part of their input in parts where the system shouldn't accept it
Living Off The Land: Use built-in system tools and utilities with scripts or malicious code inserted, in an attempt to go undetected by system security
Social engineering: All techniques aimed at talking a target into revealing specific information or performing a specific action for illegitimate reasons
Botnet: A network of infected computers coordinated to launch DDoS attacks, distribute spam emails, or execute brute-force password attacks
SEO Poisoning: Search Engine Optimization is used to improve a website for gaining greater visibility. Poisoning the SEO systems pushes malicious sites higher up the ranks of search results
Sniffing: Capturing packets sent to the network to identify unencrypted data or patterns that can be used to decipher it
Password Spraying: Based on trying the most commonly used passwords and patterns or using one password to attempt to authenticate with as many different user names as possible, hoping for one successful authentication
Rainbow Table: Compares the hash of a password with those stored in a dictionary of precomputed hashes called rainbow table
Cryptojacking: Hiding on a device or server and using it to mine cryptocurrencies without the user's consent or knowledge
Impersonation: Also known as pretexting, when an attacker presents as someone else to gain access to information
Pharming: A type of impersonation attack in which a threat actor redirects a victim from a valid website or resource to a malicious one that could appear as the valid site to the user
Phishing: When an attacker impersonates a trusted source to present a malicious link or attachment via email
Spear phishing: Is constructed in a very specific way and directly targeted to specific groups of individuals or companies, has a background profiling process by the attacker
Whaling: Similar to phishing but is targeted at high-profile business executives and key individuals in a company, designed to look like critical business emails or emails from someone who has legitimate authority, either within or outside the company
Vishing: Voice phishing, carried out in a phone conversation where an attacker persuades the user to reveal private, financial, or external information
Smishing: SMS phishing, uses text messages to send malware or malicious links to mobile devices
USB Drop Key: Leaving malicious USB drives unattended or placing them in strategic locations with the objective that a user thinks the devices are lost and inserts them into their systems
Watering hole: A targeted attack that occurs when an attacker profiles websites that the intended victim accesses to possibly compromise them and inject malicious code designed to redirect the user to another site
Piggybacking: When an unauthorized person tags along with an authorized person to gain entry to a restricted area, usually with the person’s consent
Tailgating: Essentially the same as Piggybacking with the difference it occurs without the authorized person’s consent
Dumpster diving: When a person searches for private information in garbage and recycling containers from a company or person
Shoulder surfing: When someone obtains information such as personally identifiable information, passwords, and other confidential data by looking over a victim’s shoulder
Badge cloning: When an attacker clones a badge, card, or any other device used to access a building
DNS cache poisoning: Manipulation of the DNS resolver cache through the injection of corrupted DNS data, to force the DNS server to send the wrong IP address to a user and redirect the victim to another IP
Pass-The-Hash Attack: Use a password hash collected from a compromised system to log in to another client or server, instead of figuring out what the user’s password is
Kerberoasting: Extract service account credential hashes from Active Directory to crack them
Jamming: Wireless attack that disrupts communication by flooding a Wi-Fi frequency with interference, preventing devices from connecting or transmitting data
KARMA Attack: Karma Attacks Radio Machines Automatically, involves creating a rogue AP and allowing an attacker to intercept wireless traffic to listen for the probe requests from wireless devices and intercept them to generate the same SSID
KRACK: Key Reinstallation Attack, manipulating and replaying cryptographic handshake messages tricks a wi-fi WPA2 network into reinstalling an already-in-use key
Bluejacking: Performed using Bluetooth with vulnerable devices in range to send unsolicited messages to a victim
Bluesnarfing: Performed to obtain unauthorized access to information from a Bluetooth-enabled device, being able to access remotely to local files of the target
Clickjacking: Use multiple transparent or opaque layers to induce a user into clicking on a web button or link that redirects to a malicious site