Year-End Learning Carnival: Get Free Courses and Up to 50% off on Career Booster Combos!
D H M S

Top 10 Cyber security attacks

In today’s digital world, cyber-attacks are an absolute certainty. While the basic types of attacks are still prevalent, new types of attacks have also metamorphosized, creating more monetary and physical destruction.  Here are the Top 10 Cyber Security Attacks that are highly prevalent today.

  1. Brute force attacks

The use of “passwords” is still the most popular way to authenticate a user. When an attacker tries all possible alphabet and number combinations to crack a password, that is a “brute force attack”. The attack is normally carried out by bots or computers. There are different tools that are used to perform brute force attacks like John the Ripper, Aircrack-ng, L0phtCrack, and RainbowCrack.

Brute force attacks are more successful if the length of the password is less. For example, a 8 character password can be cracked in a few seconds or a few hours using the tools mentioned. On the other hand, if the password is long and has more characters, it will take more time to crack it.

According to https://howsecureismypassword.net/, a 8 character password can be cracked within a few minutes to hours.

Did you know that – 5% of attacks in 2017 were due to brute force attacks?

Ways to prevent brute force attacks:

Since brute force attacks rely on weak and vulnerable passwords, it is good to follow the following tips to prevent them:

  1. It is mandatory to set a definite set of password tries (maybe 3)
  2. It is also good to have a combination of characters, numbers, and symbols in a password
  3. The password should length of 10 characters to reduce the possibility of being subjected to brute force attacks
  1. Denial of Service attack (DoS attack)

DoS or Denial of Service attack is probably the most commonly encountered type of attack in the digital world. In this, as the name indicates, the host is attacked and denied from serving genuine client requests. How is this done? DoS attacks can be made in many ways.  One way is to bombard the server with unlimited requests such that the server finds it difficult to respond if many such attackers attack a system in a similar way the server will be brought to a standstill in a very short time.

The other way is to send malformed packets to the server. The server does not know how to react and crashes, sending genuine requests to be rejected. The other types of denial of service attacks are distributed denial of service attacks (DDoS), Smurf attacks, teardrop attacks, fraggle attacks, and SYN flood attacks.

Ways to prevent DoS attacks:

Even though it is tough to predict DoS attacks, these measures if taken, can reduce the intensity of DoS attacks:

  1. Constantly scanning the network is probably the best way to sense DoS attacks
  2. In effect of this, Intrusion detection systems (IDS) and Intrusion Prevention Systems (IPS) tools should be installed in the network to note any anomalous traffic.
  3. Host hardening should be employed on all Internet-facing servers and devices
  4. Ingress and Egress filters should be employed to watch out for malicious traffic
  5. It is also necessary to work with the Internet service provider when the DoS attack is taking place to minimize its impact
  1.  DDoS (Distributed Denial of service attacks)

A DDoS is similar to a DoS but is more large scale and more sinister in its workings. In a DDoS, instead of one attacker or a few attackers trying to overwhelm a system, there are multiple computers taking part to overwhelm the system and bring it down. A master computer gives directions to other slave computers, and they, in turn, will cripple systems or ruin major corporations.

There are different types of DDoS attacks, such as traffic attacks, bandwidth attacks, and application attacks.

Ways to prevent DDoS attacks:

While large scale, global DDoS attacks is difficult to predict there are again a few steps that can be taken to minimize its impact:

  1. As with DoS attacks, monitoring the network for anomalous traffic is the first step in recognizing DDoS attacks
  2. Keeping an eye on social media chatter also helps us to understand any impending DDoS attacks
  3. In addition, conducting a mock DDoS attack against the existing infrastructure will help the organization be better prepared for such attacks.
  1. SMURF attacks:

A ‘Smurf’ attack is a Distributed Denial of service attack that started to appear in the late 1990s. In a Smurf attack, the attacker makes use of the ICMP or the Internet Control Message Protocol to carry out their attack. These are the steps in a Smurf attack:

  1. The attacker sends a spoofed ICMP request to a device such as a router.
  2. The spoofed IP address is the victim’s server address
  3. No sooner than an ICMP request been made to the router, it broadcasts it to all the devices connected to it.
  4. These devices, in turn, send a response to the victim flooding it.

Ways to prevent Smurf attacks:

Since Smurf attacks are DDoS attacks, preventing them is similar to preventing DDoS attacks.

  1. It is essential to monitor network traffic and do packet analysis to sense Smurf attacks
  2. Anti-virus and anti-malware can be installed to prevent Smurf attacks
  3. IP broadcast addressing can also be disabled in the router
  1. Social engineering attack

‘Social engineering’ may be the most passive, yet the most effective cybersecurity attack. It does not need excessive knowledge of cybersecurity tools or any other specialized knowledge of Information security.

A social engineering attack only needs a smooth and cunning individual to convince an innocent user to part with their bank account details, password details, and any other financial and personal information.

Ways to prevent a social engineering attack:

  1. Just like ‘Zero trust architecture’ in Information security, citizens should cultivate ‘zero trusts’ when talking to anyone regarding their financial details
  2. All citizens should be made aware of good cybersecurity practices which are listed below
  3. Do not share OTP and other financial details to anyone claiming to be from the bank or other financial institutions
  4. Do not click on any new and foreign links in SMS, email or other means of communication
  5. Do not open emails from an unknown sender
  6. Using 2-factor authentication when signing onto sensitive sites is a good practice to prevent social engineering attacks
  1. Dumpster diving

‘Dumpster diving’ is a different type of attack wherein the attacker gathers information about the victim by looking at the information that has been discarded in the dumpster or trash can. They then use this information and attack the user.

Information that can give an attacker clues may be passwords written down and discarded, access codes and even a calendar and organizational charts that may reveal more about an organization. This is the information gathering phase, which in turn can be used to attack the organization.

Ways to prevent dumpster diving:

  1. Do not write down passwords, access codes and other important information anywhere and discard them
  2. Shred all the paperwork appropriately
  3. Paper disposal policy should be established for the organization
  4. All storage media should be completely erased using appropriate tools before being discarded
  5. All employees should be made aware of the different policies and the ways to implement them
  1. Cross-site scripting(XSS) attack

A cross-site scripting attack or XSS attack is a client-side injection attack. The attacker makes use of a vulnerability in a website and inserts a malicious code inside a client-side Javascript. Once the malicious Javascript starts executing on the client-side, the attacker takes control of the interactions with the user. The attacker can further control the functionality of the application and its data.

Ways to prevent XSS attack:

  1. It is good to filter the input to minimize XSS attacks
  2. The content security policy should be enabled
  1. Buffer Overflow attacks

The memory locations where data is stored are “buffers.” When we enter data for more than the data locations allocated, it spills over onto subsequent locations of memory. This is “buffer overflow” or “buffer overrun.” As an example, we can have

In this case, ‘C’ has been allocated only 7 bytes. But, since the word ‘INFOSECURITY‘ is more than 7 bytes, the buffer overruns into subsequent memory locations.

When this happens, the program starts corrupting other areas of memory and starts behaving strangely. It may also expose the personal information of the site and give hackers the key to exploit systems.  Old programming languages such as ‘C’ and ‘C++’ are more prone to buffer overflow attacks.

Hackers study the code and make use of this vulnerability and cause the system to behave erratically or crash.

Ways to prevent buffer overflow attacks:

  1. Write well-designed code
  2. Validate user data to check to ensure that the data entered stays within the stated limits
  3. Apply all patches for older systems and use compilers that protect against buffer overflows
  4. Use of programming languages that do not use direct memory access is preferred
  1. Pharming

The act of hacking a website and redirecting users to a fake website is known as “Pharming”. In this case, users will not know that they have been redirected to a fake website. Banking sites and e-commerce organizations are popular targets of this type of attack.

Ways to stay away from “Pharmed” sites:

Alertness is the key to stay away from pharmed sites.

  1. At the very beginning, the user should check the URL of the address. Pharmed sites will have a different URL than the original URL(as an example, sbi.co.in might have changed to www.sbicoin.com)
  2. Users should always check for ‘secure’ sites when working with banks and other financial organizations. This can be done by checking the ‘padlock’ in the left-most corner of the URL
  3. All secure sites should begin with ‘https’ instead of ‘http’
  4. The certificate of the site should be verified
  1. Keystroke logging

‘Keystroke loggers’ or ‘Keyloggers’ are another way of passively attacking a system. This is done by recording the keystrokes of a user and sending it to the attacker, who then uses the information to perform other large scale attacks. This surreptitiously stolen information can also be sold to other party criminals for malicious purposes.

‘Keystroke loggers’ are not totally illegal since they can be used by employers to keep tabs on employees, parents to keep tabs on children, and so on. But when it is done mischievously, without the knowledge of an unknown user, it causes monetary and personal damage to the user.

There are two categories of keystroke loggers – hardware and software. While the hardware keystroke logger has to be physically installed on the system, the software loggers can just be downloaded by clicking on a malicious link through text messages, email, or any social media site.  The unfortunate part of keyloggers is that they do not make any difference in the functioning of a system and cannot be detected easily.

Ways to prevent and detect Keyloggers:

  1. It is good to install anti-spyware, anti-virus, anti-malware programs that may detect keyloggers
  2. It is also necessary to scan the system regularly to detect keyloggers
  3. In addition, all patches and system updates must be regularly applied
  4. Employees and other users must be advised not to download unknown attachments as these may download the malicious keyloggers.

We have seen some of the most popular cybersecurity attacks. There will be more attacks as the days unfold, but it is our knowledge and determination that will keep them away!

For more of InfoSec Train’s courses, do visit us at this link.

AUTHOR
Jayanthi Manikandan ( )
Cyber Security Analyst
Jayanthi Manikandan has a Master’s degree in Information systems with a specialization in Information Assurance from Walsh college, Detroit, MI. She is passionate about Information security and has been writing about it for the past 6 years. She is currently ‘Security researcher at InfoSec train.
Auditing Artificial Intelligence with ISO 42001
TOP
whatsapp