02 CyberSecurity Type Stats
02 CyberSecurity Type Stats
02 CyberSecurity Type Stats
● Malware is the most common type of cyberattack, mostly because this term encompasses
many subsets such as ransomware, trojans, spyware, viruses, worms, keyloggers, bots,
cryptojacking, and any other type of malware attack that leverages software in a malicious
way.
Ransomware
Ransomware attacks are usually launched through malicious links delivered via phishing
emails, but unpatched vulnerabilities and policy misconfigurations are used as well.
Fileless Malware
Fileless malware is a type of malicious activity that uses native, legitimate tools built into a
system to execute a cyber attack.
Unlike traditional malware, fileless malware does not require an attacker to install any code on
a target’s system, making it hard to detect.
Spyware
Adware
Adware is a type of spyware that watches a user’s online activity in order to determine
which ads to show them.
Trojans are installed through social engineering techniques such as phishing or bait
websites.
Worms
A worm is a self-contained program that replicates itself and spreads its copies to other
computers.
Embedded worms can modify and delete files, inject more malicious software, or
replicate in place until the targeted system runs out of resources.
Rootkits
Once activated, the malicious program sets up a backdoor exploit and may deliver
additional malware
Mobile Malware
Keylogger
In a keylogger attack, the keylogger software records every keystroke on the victim’s
device and sends it to the attacker.
Botnet
Botnet is a network of computers infected with malware that are controlled by a bot herder.
The bot herder is the person who operates the botnet infrastructure and uses the
compromised computers to launch attacks designed to crash a target’s network, inject
malware, harvest credentials or execute CPU-intensive tasks.
Scareware
Scareware tricks users into believing their computer is infected with a virus.
Typically, a user will see scareware as a pop-up warning them that their system is infected.
This scare tactic aims to persuade people into installing fake antivirus software to remove
the “virus.” Once this fake antivirus software is downloaded, then malware may infect your
computer.
2. Denial of Service (DoS) Attack
● A Denial-of-Service (DoS) attack is a malicious, targeted attack that floods a network with
false requests in order to disrupt business operations.
● The difference between DoS and Distributed Denial of Service (DDoS) attacks has to do with
the origin of the attack. DoS attacks originate from just one system while DDoS attacks are
launched from multiple systems.
● DDoS attacks are faster and harder to block than DOS attacks because multiple systems
must be identified and neutralized to halt the attack.
3. Phishing
Phishing is a type of cyberattack that uses email, SMS, phone, social media, and social
engineering techniques to entice a victim to share sensitive information
1. Spear Phishing: Spear-phishing is a type of phishing attack that targets specific individuals
or organizations typically through malicious emails.
2. Whaling: A whaling attack is a type of social engineering attack specifically targeting senior
or C-level executive employees with the purpose of stealing money or information.
3. SMiShing: Smishing is the act of sending fraudulent text messages designed to trick
individuals.
4. Vishing: Vishing, a voice phishing attack, is the fraudulent use of phone calls and voice
messages pretending to be from a reputable organization
4. Spoofing
Spoofing is a technique through which a cybercriminal disguises themselves as a known or
trusted source. Spoofing can take different forms, which include:
1. Man-in-the-Middle (MITM) Attack : A man-in-the-middle attack is a type of cyberattack in which an attacker eavesdrops
on a conversation between two targets with the goal of collecting personal data, passwords or banking details, and/or to
convince the victim to take an action such as changing login credentials.
2. Pass-the-Hash Attack : Pass the hash (PtH) is a type of attack in which an adversary steals a “hashed” user credential
and uses it to create a new user session on the same network. It does not require the attacker to know or crack the
password to gain access to the system.
3. Credential Stuffing : Credential stuffing attacks work on the premise that people often use the same user ID and
password across multiple accounts. Therefore, possessing the credentials for one account may be able to grant access
to other, unrelated account.
4. Brute Force Attacks: A brute force attack is uses a trial-and-error approach to systematically guess login info,
credentials, and encryption keys. The attacker submits combinations of usernames and passwords until they finally
guess correctly.
6. Code Injection Attacks
Code injection attacks consist of an attacker injecting malicious code into a vulnerable computer or
network to change its course of action.
1. SQL Injection : A SQL Injection attack leverages system vulnerabilities to inject malicious SQL
statements into a data-driven application, which then allows the hacker to extract information from
a database.
2. Cross-Site Scripting (XSS) : Cross Site Scripting (XSS) is a code injection attack in which an
adversary inserts malicious code within a legitimate website. The code then launches as an
infected script in the user’s web browser, enabling the attacker to steal sensitive information or
impersonate the user.
3. Malvertising : Typically, the attacker begins by breaching a third-party server, which allows the
cybercriminal to inject malicious code within a display ad or some element thereof, such as banner
ad copy, creative imagery or video content. Once clicked by a website visitor, the corrupted code
within the ad will install malware or adware on the user’s computer.
7. Supply Chain Attacks
A supply chain attack is a type of cyberattack that targets a trusted third-party vendor
who offers services or software vital to the supply chain.
1. Software supply chain attacks: Inject malicious code into an application in order to
infect all users of an app. Particularly vulnerable because modern software is not
written from scratch: rather, it involves many off-the-shelf components, such as
third-party APIs, open source code and proprietary code from software vendors.
2. Hardware supply chain attacks: compromise physical components for the same
purpose.
8. Insider Threats
Insider threats are Internal actors such as current or former employees that pose danger
to an organization because they have direct access to the company network, sensitive
data, and intellectual property (IP), as well as knowledge of business processes,
company policies or other information that would help carry out such an attack.
Once infected, the hacker can freely engage in command-and-control activities. This tunnel
gives the hacker a route to unleash malware and/or to extract data, IP or other sensitive
information by encoding it bit by bit in a series of DNS responses.
10. IoT-Based Attacks
An IoT attack is any cyberattack that targets an Internet of Things (IoT) device or network.
Once compromised, the hacker can assume control of the device, steal data, or join a group
of infected devices to create a botnet to launch DoS or DDoS attacks.
Statistics
List of Breaches: https://en.wikipedia.org/wiki/List_of_data_breaches