The Anatomy of a Cyber Attack: Understanding Common Tactics and Techniques -2

Gokul
3 min readMar 9, 2023

--

Cyber Attack

Here we will see the remaining cyberattack types,

If you did not read the part 1 content then use this URL to get that.

https://medium.com/@gokulelango1040/the-anatomy-of-a-cyber-attack-understanding-common-tactics-and-techniques-5a1f9782daac

6. Denial-of-Service Attack

A Denial-of-Service Attack poses a serious risk to businesses. Attackers target systems, servers, or networks in this case and bombard them with traffic to deplete their bandwidth and resources.

When this occurs, the servers get overburdened with serving incoming requests, which causes the website it hosts to either go down or slow down. The valid service requests go unattended as a result.

When attackers employ numerous hacked systems to initiate this attack, it is sometimes referred to as a DDoS (Distributed Denial-of-Service) attack.

7. Insider Threat

An internal danger, as the name implies, involves an insider rather than a third party. In this situation, it can be someone who works for the company and is well-versed in its operations. The potential damage from insider threats is enormous.

Small organizations are particularly vulnerable to insider threats because their employees frequently have access to sensitive data. There are several causes for this kind of attack, including avarice, malice, and even negligence. Insider threats are tricky because they are difficult to predict.

8. Crypto jacking

Crypto jacking is a phrase that has a lot to do with cryptocurrencies. When hackers get access to another person’s computer to mine cryptocurrencies, this is known as crypto jacking.

By infecting a website or tricking the victim into clicking on a malicious link, access is achieved. For this, they also use JavaScript-coded internet advertisements. Since the Crypto mining code operates in the background, the only indication that a victim might see is a delay in execution.

9. Zero-Day Exploit

After a network vulnerability is disclosed, a Zero-Day Exploit occurs; in most circumstances, there is no fix for the issue. As a result, the vendor alerts consumers to the vulnerability; nevertheless, the info also reaches the attackers.

The vendor or developer may need any amount of time to address the problem, depending on the severity of the vulnerability. In the meanwhile, the exposed vulnerability is the focus of the attackers. They make sure to take advantage of the vulnerability even before a patch or other fix is put in place.

10. Watering Hole Attack

Here, a certain group inside an organization, locale, etc., is the victim. In such an assault, the attacker picks websites that the targeted group frequents regularly. Websites are found either by attentively observing the group or by making an educated assumption.

These websites are then infected with malware by the attackers, which then compromises the systems of the victims. Such an assault uses malware to target the user’s private data. Here, the hacker may also gain remote access to the compromised machine.

Technology gives people freedom and privacy, but it’s also the most hazardous one.So handle it very carefully.

--

--

Gokul
Gokul

Written by Gokul

Cybersecurity Enthusiast | Smart India Hackathon |TN Police Hackathon Finalist | Linux | WebApp Penetration Tester | CCNA |Intern At Coimbatore CyberCrime Dept

No responses yet