Cyber Attack Definitions: Vishing, Ransomware, and Botnets

Classified in Technology

Written on in English with a size of 3.35 KB

Common Cyber Attack Definitions and Techniques

Vishing: Voice Phishing Attacks

Using telephone calls to commit a phishing attack.

Smishing: SMS Phishing

Using SMS (text messages) to commit a phishing attack.

Pharming and DNS Poisoning

Directs users to a fake website when they enter the URL of a genuine site.

Whaling: Targeting High-Value Individuals

A specialized type of phishing attack specifically targeting high-ranking executives, such as CEOs, via email.

Salami Slicing Technique

A financial crime where small, often undetectable amounts of money are stolen from a large number of accounts. The cumulative gain is significant, but individual victims rarely notice the loss.

Data Diddling

Altering data, typically by changing information before or during entry into a computer system (e.g., forging or counterfeiting documents). The altered data is often changed back after processing to conceal the malicious activity.

Piggybacking (Unauthorized Access)

An unauthorized user gains access to a system by using a legitimate user’s identification and password to log into the network illegally, often pretending to be the authorized user.

Password Guessing Attacks

Aims to crack a password. This can be achieved through various methods, including:

  • Dictionary attacks
  • Hybrid attacks
  • Brute force attacks

Social Engineering

The psychological manipulation of people into performing actions or divulging confidential information, such as passwords or other sensitive data. This technique is often highly effective against inexperienced users.

Keyloggers

Software or hardware designed to capture and record every keystroke typed by users on a compromised device.

Man-in-the-Middle (MITM) Attacks

Intercepts communication between two systems or users. The attacker can intercept data without redirecting the user, meaning the participants often do not realize their conversation or data exchange is being monitored or controlled by a hacker.

Spoofing and Interface Impersonation

Steals passwords or sensitive data by creating a fake interface or website. The user is redirected to false profiles or sites that mimic legitimate ones, sending the entered information directly to the hacker.

Zombie Computers

A computer infected with malware that installs backdoors, allowing an unauthorized user to remotely control the machine. Cybercriminals often control many zombies simultaneously via botnets.

Botnets: Networks of Compromised Devices

Groups of compromised computers under the control of a criminal or unauthorized user. Botnets are commonly used to:

  • Send out spam or phishing emails.
  • Distribute further malicious software.
  • Perform Distributed Denial of Service (DDoS) attacks on other computer systems.

Botnets provide an easy way for criminals to commit cybercrime while maintaining anonymity.

Ransomware Attacks

An attack where a hacker gains unauthorized access to a system and uses cryptovirology to encrypt all files. The attacker then demands a ransom (often in cryptocurrency like Bitcoin) for the decryption key, effectively "kidnapping" the victim's data.

Related entries: