With more than 2,000 publicly disclosed data breaches in the first half of 2020, cyber attacks pose a massive threat to organisations of all sizes.
As the Covid-19 continues to spread across the world, it has compelled almost everyone to be confined at home, which led to increasing numbers of users relying on the internet for work and services. The corona virus pandemic has also led organizations to adopt new ways of working; which led to employees rely on basic networking and cloud services for data privacy.
These factors have opened more windows of opportunity for cyber criminals to take advantage of the situation and make more money or create disruption.
we explore five of the most common cyber attack methods and discuss what you can do to protect your organisation.
2019 State of the Phish Report found that 83% of respondents experienced a phishing attack in 2018 (up from 76% in 2017) and 2019 Data Breach Investigations Report revealed that 32% of data breaches involved phishing.
Types of Phishing
There are many types of phishing, including:
Ransomware is a type of malicious software designed to deny access to files until, or threaten to publish the victim’s data unless, a ransom is paid (although there is no guarantee that access will be restored, or that the criminal hacker will destroy the data).
The threat is growing. The 2019 Official Annual Cybercrime Report predicts that a business will fall victim to a ransomware attack every 14 seconds in 2019, and every 11 seconds by 2021.
A DDoS (distributed denial-of-service) attack attempts to disrupt regular web traffic and take a site offline by overwhelming a system, server or network with more access requests than it can handle.
DDoS attacks typically serve one of two purposes:
Much like a flu virus, it is designed to spread from one computer to another (but without the user’s knowledge) by:
There are four main types of attack vector:
A drive-by cyber attack targets a user through their Internet browser, installing malware on their computer as soon as they visit an infected website.
A MITM attack is where an attacker alters the communication between two users, impersonating both victims to manipulate them and gain access to their data. The users are not aware that they are communicating with an attacker rather than each other.
Outdated (unpatched) software often contains vulnerabilities that criminal hackers can use to bring entire systems down. Where they exploit a vulnerability made public before a patch or solution has been rolled out by the developer, this is referred to as a zero-day attack.