
A cyberattack is an assault launched targetting computer systems and networks. In the modern world, there are a variety of techniques and attack types used by hackers to achieve their objectives.
Malware
Malware is a malicious piece of software that is specifically designed to collect information or to damage a computer system by gaining unauthorized access. Examples of modern malware include WannaCry and HenBox. Wannacry is a ransomware attack that infected around 250,000 windows computers worldwide in 2017. The damage caused by Wannacry is estimated at around US$5 Billion. HenBox typically appears as a legitimate Android system and VPN apps, and sometimes embeds legitimate apps. The main goal of the HenBox apps is to spy on those who install them.
There are several types of malware which include,
- Viruses: This is a special type of malware that is self-replicating. First, it needs to be executed by a user or a process to infect the host system
- Worms: Unlike viruses, worms do not need to be executed by a user or a process to infect the host system. Worms usually target the computer networks spreading rapidly through replication.
- Trojan horses: Malware that is disguised as a harmless program, but actually givesattackers elevated proviledge and full control of an endpoint when installed. Unlike other types of malware types, trojan horses are not self-replicating
- Ransomware: Malware that locks a computer or device or encrypts data on an infected endpoint with an encryption key that only the attacker knows, thereby making the data unusable until the victim pays a ransom
- Back doors: This type of malware allows an attacker to bypass authentication to gain unauthorized access to a compromised system
- Logic bombs: Logic bombs are a special type of malware that is triggered when a specific condition is met (Like a special date)
- Rootkits: This type of malware allows the attackers to get root-level access to a computer. Usually, rootkits are installed to BIOS of a computer. This prevents operating system level security tools from detecting them.
https://www.checkpoint.com/cyber-hub/cyber-security/what-is-cyber-attack/
Nice writing. Do bots do any harm to the victim's computer other than harvesting computing resources. Like stealing data or something similar
ReplyDeleteIf you can write about an article what we can do to mitigate these kinds of cyberattacks.
ReplyDeleteNice read santhoopa. How do we know whether our computer is in threat or not?
ReplyDeleteMay be you can see suspicious activities specially the ones that are not initiated by you. Also you can check for background processes from the untrusted sources.
DeleteA Comprehensive explanation Santhoopa..keep writing more on cyber security
ReplyDeleteGreat Article! What is the most dangerous attack or malware out there in your opinion?
ReplyDeleteInformative article Santhoopa.keep writing!!
ReplyDelete