Cyber Attack Definitions: Vishing, Ransomware, and Botnets
Classified in Technology
Written on in
English with a size of 3.35 KB
Common Cyber Attack Definitions and Techniques
Vishing: Voice Phishing Attacks
Using telephone calls to commit a phishing attack.
Smishing: SMS Phishing
Using SMS (text messages) to commit a phishing attack.
Pharming and DNS Poisoning
Directs users to a fake website when they enter the URL of a genuine site.
Whaling: Targeting High-Value Individuals
A specialized type of phishing attack specifically targeting high-ranking executives, such as CEOs, via email.
Salami Slicing Technique
A financial crime where small, often undetectable amounts of money are stolen from a large number of accounts. The cumulative gain is significant, but individual victims rarely notice the loss.
Data Diddling
Altering data, typically by changing information before or during entry into a computer system (e.g., forging or counterfeiting documents). The altered data is often changed back after processing to conceal the malicious activity.
Piggybacking (Unauthorized Access)
An unauthorized user gains access to a system by using a legitimate user’s identification and password to log into the network illegally, often pretending to be the authorized user.
Password Guessing Attacks
Aims to crack a password. This can be achieved through various methods, including:
- Dictionary attacks
- Hybrid attacks
- Brute force attacks
Social Engineering
The psychological manipulation of people into performing actions or divulging confidential information, such as passwords or other sensitive data. This technique is often highly effective against inexperienced users.
Keyloggers
Software or hardware designed to capture and record every keystroke typed by users on a compromised device.
Man-in-the-Middle (MITM) Attacks
Intercepts communication between two systems or users. The attacker can intercept data without redirecting the user, meaning the participants often do not realize their conversation or data exchange is being monitored or controlled by a hacker.
Spoofing and Interface Impersonation
Steals passwords or sensitive data by creating a fake interface or website. The user is redirected to false profiles or sites that mimic legitimate ones, sending the entered information directly to the hacker.
Zombie Computers
A computer infected with malware that installs backdoors, allowing an unauthorized user to remotely control the machine. Cybercriminals often control many zombies simultaneously via botnets.
Botnets: Networks of Compromised Devices
Groups of compromised computers under the control of a criminal or unauthorized user. Botnets are commonly used to:
- Send out spam or phishing emails.
- Distribute further malicious software.
- Perform Distributed Denial of Service (DDoS) attacks on other computer systems.
Botnets provide an easy way for criminals to commit cybercrime while maintaining anonymity.
Ransomware Attacks
An attack where a hacker gains unauthorized access to a system and uses cryptovirology to encrypt all files. The attacker then demands a ransom (often in cryptocurrency like Bitcoin) for the decryption key, effectively "kidnapping" the victim's data.