Tips icon National Cyber helpline-DeposititTypes of Cyber Attack

Understanding the threat is a good first step in combating cyber crime. The glossary below explains the most common risks that we all face.

MALWARE
mal-ware

Software that is intended to damage or disable computers and computer systems. Short for 'malicious software' malware refers to software programs designed to damage or do other unwanted actions on a computer system. Common examples of malware include viruses, worms, trojan horses, ransomware and spyware.

RANSOMWARE
ran-som-ware

Ransomware is a type of malware that severely restricts access to a computer, device or file until a ransom is paid by the user. This class of malware is a criminal moneymaking scheme that can be installed through deceptive links in an email message, instant message or website. It has the ability to lock a computer screen or encrypt important, predetermined files with a password.

PHISHING
phish-ing (pronounced fishing)

The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

Traditional phishing attacks are usually conducted by sending malicious emails to as many people as possible. The attackers know that the more people they reach, the more people are likely to fall victim. It is therefore not unusual for phishing attacks to target thousands, or even millions of people at once, independent of where they live or work. To fool, trick or attack the victims, the phishing email usually appears to come from a trusted source. For example a bank or someone the victims may know.

The phishing message will often try to lure the victims into opening an infected attachment, or into clicking on a link that will take them to a malicious website. The attacker will then attempt to infect and take control over the victims computers or to harvest their usernames and passwords.

SPEAR PHISHING
spear phish-ing

A spear phishing attack will also appear to come from a trusted source. However, unlike a traditional phishing attack, a spear phishing attack will be highly targeted. The message will be sent only to one person or a few, carefully selected individuals. The overall goal of the attack, will determine who gets selected as intended victims.

Before crafting the message, the attacker will research the intended victims social media profiles, like LinkedIn, Twitter and Facebook. Afterwards, the attacker will try to build a profile on the victims life, work and interests. This will be used to create a highly customized message that will come across as credible and relevant to the victim. In addition, the attacker will gather information about the victims’ friends and colleagues. Such as their names and email addresses. This in order to make the email appear like it is sent from one of them.

Because spear phishing attacks are highly targeted and customized, they are far more likely to succeed than traditional phishing attacks. This is concerning as the spear phishing attackers usually have very specific goals. Typical goals are accessing highly confidential information or corporate business secrets. A company can also be targeted as a stepping stone for getting access to another company. A small company may therefore be just as prone to a spear phishing attack, as a larger company. The result may in both cases be substantial revenue loss or damaged reputation.

DENIAL OF SERVICE ATTACK

In computing terms, a denial-of-service attack (also referred to as a DoS attack) is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

DDoS is short for Distributed Denial of Service. DDoS is a type of DOS attack where multiple compromised systems are used to target a single system causing a Denial of Service (DoS) attack.

While a DoS attack may involves one single computer just running a DoS 'tool' a DDoS attack is often much more sophisticated. DDoS attacks are usually carried out from within botnets. A botnet is a group of computers that have been rounded up against their will, usually because of a virus or something else.