• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

5 Major Cyber Attacks that Can Take Place

March 29, 2019Simeon Georgiev

We all might be quite familiar with the term cyber attacks and may have come across it numerous times in our daily life. To make it clear, cybercrime can be understood as a crime in which a computer is the object of the offense (hacking, phishing, spamming) or is used as a tool to commit a crime (child pornography, hate crimes). Cybercriminals may use information technology to access personal information, business trade secrets or use the internet for corrupt or venomous purposes. Criminals can also use computers for communication and documentation or data storage.

Having known what cyber crime is we can now take a look at some major examples from the past to get a much clear picture of the offense.

Hacking

Hacking is an effort to exploit a computer network or a personal system inside a computer. In simpler terms, it is the unapproved entrance to or control over computer network security systems for some illegitimate motives. For example, The Mirai Botnet attack which took place in October of 2016, the deadliest DDoS offense ever was initiated on service provider Dyn having used an IoT botnet. This caused large proportions of the internet crashing, inclusive of Twitter, the Guardian, Netflix, Reddit, and CNN. This IoT botnet was actually put into action by a malware called Mirai. Once damaged with Mirai, computers constantly browse the internet for unprotected IoT mechanisms and then use known default usernames and passwords to log in, infecting them with malware.

Phishing

Phishing is a type of deception in which a criminal dissimulates as an esteemed body or person in email or other communication network. The offender uses phishing emails to issue hostile links or attachments that can carry out a variety of tasks, including the extraction of login credentials or account information from targeted users.

Ransomware

As we can understand by the name itself, ransomware involves the use of ‘ransom’ to carry out the practices it requires. Ransom refers to the sum of money demanded or paid for the release of a captive. Similarly, ransomware is a subdivision of a virus in which the information on a targeted user’s computer is locked, usually by encryption, and payment is demanded before the ransomed data is decrypted and extra returned to the victim.

Pharming

Phishing lures targeted users through false emails to get them to visit false sites and reveal their personal data.  Pharming is a form of phishing, but without the attraction.  A hacker penetrates a computer network and installs a venomous code that causes website traffic from the system to be transferred to false sites made by the hacker.  This is done without the victim’s knowledge or consent.

Cyber stalking

Cyberstalking is stalking that occurs using electronic mechanism or the internet. It is the technological harassment which targets a particular person or individual. There are several forms of cyberstalking. For example, placing orders for delivery using a fake name or someone else’s name (which is also illegal), collecting confidential data of the user spreading false rumors, etc.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Minimize your exposure to cyber-attacks with these tips Next post Cryptocurrency Mining Farms in China are Victim of Ransomware

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.