Types of online attacks
Familiarize yourself with the different types of attacks carried out by cybercriminals
A complex attack, referred to as an advanced persistent threat or targeted attack, is a series of covert and continuous computer intrusion processes usually carried out by a highly advanced and well-organised hacking group with adequate resources (both financial and technical) to undertake such activities.
A type of malware that intrusively displays advertisements unwanted by the user (in the form of pop-ups or a system window that can’t be closed). The term also refers to a type of software licence, distributed free of charge, whose authors are paid for including advertisements commissioned by sponsors in the program.
It occurs following the pairing of the hacker's device with that of their victim (via Bluetooth). The attacker then instals a backdoor code or malware to bypass the authentication process (usually by exploiting vulnerabilities in the mobile device's outdated operating system) and gains full access to the laptop or phone. This allows reading messages, making calls, or even redirecting calls to other devices belonging to the cybercriminal.
Gaining access to text messages, calendar, contact book, etc. by exploiting flaws in the attacked device's software, or by gaining the ability to establish an authorised connection with it via Bluetooth (usually by gaining physical access to the device or the victim's unwitting consent), or obtaining data via a "back door" created by deliberately setting up the victim's device to connect to the cybercriminal's device.
A type of malware that, when triggered, injects its own malicious code into other files or programs to spread through the infected host. This occurs when applications infected in this way are run, with the malicious code running first, replicating further and causing other damage, such as corrupting system files, deleting data, or attempting to take control of the device.
Attacks that exploit weaknesses in cryptographic algorithms. The attack vectors can be very different here, depending on the circumstances of the hacker's actions. They may concern, for example, errors in algorithm implementation (e.g. SSL library used by a given website), use of outdated cryptographic protocol (e.g. SSL 2.0/3.0), or an encryption key of insufficient length (fewer than 2,048 bits).
Unwanted software most often installed when using download assistants included in many online software repositories or as part of the installation process of free software. It can vary in nature, being more akin to adware (aggressive advertising on the user's computer) or spyware (spying on their activity, collecting data on the use of a particular device without consent).
Sending a very large number of unsolicited messages to multiple recipients for a specific purpose, such as marketing, or simply sending a particular message over and over again to the same recipient. The medium with which it’s usually associated is e-mail, but the term is also applied to messages of this nature on social networks, instant messaging platforms, online forums or via SMS messages.
A malicious program that impersonates useful or interesting applications but performs unwanted actions without the user's knowledge. Most commonly, it acts as backdoor code, meaning that it opens a "back door" to other malware, downloading more malicious code and attempting to allow the attacker to take control of the infected machine. This can lead to confidential information being stolen (banking trojans come to mind in this context) or data being deleted or encrypted by ransomware.