Common Cyber Attacks and Defense Strategies

CyberPands
9 min readMar 9, 2023

--

A brief explanation of common attacks along with their red flags and defensive techniques.

Photo by Tim Käbel on Unsplash

Cyber Attack

A cyber attack is an attempt to exploit vulnerabilities in computer systems, networks, or devices for malicious purposes. Cyber attacks can take many forms, including stealing sensitive data, disrupting normal operations, and causing physical damage to equipment. They can be launched by individuals, criminal organizations, or state-sponsored entities, and can be carried out remotely from anywhere in the world.

Cyber attacks can be highly sophisticated and complex, utilizing advanced techniques such as social engineering, malware, and zero-day exploits. They can target individuals, businesses, governments, and critical infrastructure such as power grids and transportation systems.

The consequences of a successful cyber attack can be severe, including financial loss, reputational damage, and in some cases, loss of life. Cybersecurity experts work to identify and mitigate vulnerabilities in computer systems and networks and develop strategies to prevent and respond to cyber-attacks.

We’ll cover nine various types of attacks along with their definition, common red flags to look out for, attack methods and defensive strategies.

Phishing

Phishing is a type of cyber attack where an attacker poses as a trustworthy entity, such as a bank or email provider, to trick a victim into revealing sensitive information like login credentials, credit card numbers, or other personal information. Phishing attacks can be carried out through email, social media, or messaging platforms, and often include a link to a fake website that looks legitimate but is designed to steal information.

The goal of phishing attacks is to use stolen information for financial gain or to gain access to sensitive systems or data. It is important to be cautious when clicking links or providing personal information online and to verify the legitimacy of the sender before taking any action.

Red Flags

  1. Look out for common grammatical mistakes in the body of the email.
  2. Check for suspicious URLs in the content part of an email.
  3. Check if the sender's email is genuine and describes from where the email has originated (Example: hr-person@company.com)
  4. Also, check for small changes in the sender's email address and URLs.
  5. Wait!! Don’t reply directly to any email that shows urgency. Check and then reply.

Attack Methods

  1. Mostly Email
  2. Social Media
  3. Websites

Defence Methods

  1. The first method is to always check for red flags.
  2. Do not directly click on any attachments via email or other messaging software from an unknown sender.
  3. Always use a good spam filter and a strong password for your email software or client.

Spear Phishing

Spear phishing is a targeted form of phishing where an attacker customizes the phishing message to a specific individual or group, using personal information to make the message appear more legitimate. Spear phishing attacks often use sophisticated tactics such as social engineering and spoofed email addresses to trick the victim into revealing sensitive information or clicking on a malicious link or attachment.

The goal of spear phishing attacks is to gain access to sensitive data or systems, often for financial gain or espionage purposes. It is important to be cautious when opening emails, especially those from unfamiliar senders, and to verify the legitimacy of the sender before taking any action.

Spear phishing has the same red flags, attack methods and defensive methods.

The major red flag to look out for is when you receive an email after working hours with a sense of urgency. Always try to check emails properly and verify them with the IT team.

Whaling

Whaling, also known as business email compromise (BEC), is a type of cyber attack that targets high-level executives or individuals in an organization, with the goal of tricking them into revealing sensitive information or authorizing fraudulent transactions.

The attackers often use social engineering tactics, such as impersonating a trusted individual or creating a sense of urgency, to manipulate their targets. They may also use sophisticated techniques like spear-phishing, where they send targeted emails that appear legitimate to gain access to sensitive data or to compromise the organization’s network.

Red Flags

  1. Emails from the higher authority stating an urgent request.
  2. An email requesting to perform a particular fund transfer.
  3. Email requiring sending employer’s personal information.

Attack Methods

  1. It’s just through Emails.
  2. But, considering the new technology era LinkedIn is also on the list. Where every employee's data is readily available.

Defence Methods

  1. Always double-check the sender’s email address.
  2. Protect employee accounts with multi-factor authentication (MFA).
  3. Deploying powerful email filters and firewalls.
  4. Training employees regarding such types of social engineering attacks.

Smishing

Smishing is a type of cyber attack that uses text messages or SMS to trick people into providing personal information, such as login credentials or financial data. Smishing attacks often use social engineering techniques to create a sense of urgency or fear in the victim, prompting them to click on a malicious link or respond to the text message.

The goal of a smishing attack is to obtain sensitive information or install malware on the victim’s device. These attacks can be difficult to detect, as the text messages often appear to be from a legitimate source, such as a bank or a trusted organization.

Red Flags

  1. A text message from an unknown sender containing links.
  2. A text message from a weird number or other international numbers.

Attack Methods

  1. An SMS that may install malware into your system.
  2. An SMS may contain a malicious link to a fake website.
  3. An SMS asking to send your personal information over a text message.

Defence Methods

  1. Ignore SMS from any Financial Institute if arrived from International Number or an unidentified person.
  2. Never click on links within SMS unless verified.
  3. Use powerful anti-malware software and keep it up-to-date
  4. Always verify the authenticity of the message and the sender by contacting the organisation.

Vishing

Vishing is a type of cyber attack that uses voice-over IP (VoIP) technology to trick people into revealing sensitive information, such as credit card numbers or login credentials. Vishing attacks typically begin with a phone call, where the attacker impersonates a trusted source, such as a bank or government agency.

The attacker uses social engineering tactics to create a sense of urgency or fear in the victim, prompting them to provide the requested information or to click on a link that installs malware on their device. Vishing attacks can also be carried out through automated voice messages or text-to-speech technology.

Red Flags

  1. Caller asking for your Personal Information or Bank account details.
  2. A caller claiming to represent a specific administrator of XYZ company.
  3. Caller trying to create fear or a sense of urgency.

Attack Methods

  1. Voice call from an unknown number or International number.

Defence Methods

  1. Never reply to prompts or press any buttons while receiving calls from an unknown caller.
  2. Verify the authenticity of calls from the organisation by calling their customer care number or visiting the website.
  3. Avoid such calls.

Dumpster Diving

Dumpster diving refers to the practice of searching through someone’s trash or discarded items in order to find useful or valuable items. This activity is often associated with individuals looking for food or other necessities, but it can also be done for other reasons, such as finding discarded electronics or personal information.

In the context of cybersecurity, dumpster diving is a type of social engineering tactic used by attackers to obtain sensitive information, such as financial records or confidential documents. The attackers may search through an organization’s trash or recycling bins to find discarded papers that contain information such as passwords, account numbers, or other confidential information.

Red Flags

  1. Verify if the information can be retained from the discarded document.
  2. Directly discarding boxes, documents, and other valuable materials without scratching personal information.

Attack Methods

  1. Employer’s trash can be useful to find organisational data if the documents are not shredded.
  2. Any other valuables found in the trash may help an attacker to re-track the victim.

Defence Methods

  1. Destroy everything that contains personal information along with organisational data being shredded and then discarded.
  2. Train employees to dispose of sensitive information properly and report any suspicious activity.

It’s important to keep in mind that information that may seem trivial or insignificant can still be used by attackers to gain access to sensitive data.

Tailgating

Tailgating, also known as piggybacking, is a type of physical security breach where an unauthorized individual gains entry to a restricted area by following closely behind someone who has proper access. This technique is often used by attackers to bypass security controls and gain access to areas that they would not be able to enter on their own.

In the context of cybersecurity, tailgating can be a serious threat to organizations as attackers can gain access to sensitive data or physical assets. This type of attack can be difficult to detect, as the attacker may appear to be a legitimate employee or visitor.

Red Flags

  1. An unauthenticated individual follows you to a restricted area.
  2. A person requesting you to provide an entry since they misplaced or left their ID at the desk.

Attack Methods

  1. Simply following the person.
  2. Asking for help.
  3. Sniffing and evading security.

Defence Methods

  1. Always have proper physical security throughout the organisation's premises.
  2. Never allow any person without proper authentication to use your system.
  3. Contact the security team if you find something suspicious.

Baiting

Baiting is a type of cyber attack that uses social engineering tactics to trick individuals into divulging sensitive information or installing malware on their devices. This type of attack typically involves offering a tempting item, such as a free download or gift card, in exchange for the victim taking a certain action.

Baiting attacks can be carried out through a variety of channels, including email, social media, or physical media such as USB drives. The attack aims to get the victim to download a file or click on a link that installs malware on their device or to provide sensitive information such as login credentials or credit card numbers.

Red Flags

  1. Someone provides you with a USB drive or you might find one lying at the corner of the road.
  2. If you found out someone providing free stuff online on websites or offline on road.
  3. Winning a huge price amount for a survey or a giveaway that you haven’t entered.

Attack Methods

  1. Corrupted USB drive that steals personal information once connected to your system.
  2. The malicious link redirects users to fake websites containing free games, songs, movies or wallpapers that have malware stored underneath which activates ones downloaded to the system.

Defence Methods

  1. Never be greedy and grab free stuff without verification.
  2. Never plug the USB unless authenticated by the IT team or sender.
  3. Never give out too much personal information.

Impersonation

Impersonation is a type of cyber attack that involves an attacker masquerading as a trusted individual or entity in order to obtain sensitive information or gain access to restricted systems or areas. Impersonation attacks can take many forms, including email spoofing, phishing, and social engineering.

In email spoofing attacks, the attacker sends an email that appears to be from a legitimate source, such as a bank or a trusted organization, but is actually from a fraudulent email address. The attack aims to get the victim to provide sensitive information or to click on a link that installs malware on their device.

In phishing attacks, the attacker sends an email or message that appears to be from a trusted source, such as a colleague or supervisor, in order to obtain login credentials or other sensitive information.

Red Flags

  1. Someone making a suspicious request.
  2. A person acting too friendly to gain trust.
  3. Look out for new workers interested in your business stuff.

Attack Methods

  1. Identity theft allows an attacker to gain trust and access the company’s internal network.
  2. Performing various social engineering attacks on victims and organisations.

Defence Methods

  1. If impersonated always contact the manager and IT team.
  2. Never share your password with any individuals.
  3. Always beware of your surroundings.
  4. Adhere to the company’s policies.

Conclusion

In conclusion, cyber-attacks come in many different forms and can be carried out through various channels, including email, social media, and physical access. Some of the most common types of cyber attacks include phishing, malware, social engineering, and material security breaches such as tailgating or dumpster diving.

It’s important to keep in mind that cybersecurity is an ongoing process and that new threats and attack techniques are constantly emerging. By staying informed about the latest threats and taking proactive steps to protect against them, individuals and organizations can help to minimize the risk of a cyber attack and safeguard their sensitive data and assets.

Thank you all readers for taking your time out and reading this informative post. I would love to hear from the you about some more points that I might have missed in the post in the comments. Moreover, I will try to keep updating these post with the lastest and upcoming threats and defense strategies.

Please feel free to read my Cybersecurity for Beginner blog here

https://medium.com/@cyberpands/cyber-security-for-beginners-by-cyberpands-72c82805d841

--

--

CyberPands

A technology enthusiast with a strong interest in cybersecurity who is eager to share his knowledge with the rest of the world.