What's cyber attack and how it's work
- Get link
- X
- Other Apps
❇️ What is a cyber attack?
- A cyber attack is any attempt to
gain unauthorized access to a computer, computing system or computer
network with the intent to cause damage. Cyber attacks aim to disable,
disrupt, destroy or control computer systems or to alter, block, delete,
manipulate or steal the data held within these systems.
- A cyber attack can be launched from anywhere by any individual or group using one or more various attack strategies.
-
People who carry out cyber attacks are generally regarded as
cybercriminals. Often referred to as bad actors, threat
actors and hackers, they include individuals who act alone, drawing on
their computer skills to design and execute malicious attacks. They can
also belong to a criminal syndicate, working with other threat actors to
find weaknesses or problems in the computer systems --
called vulnerabilities -- that can be exploited for criminal gain.
-
Government-sponsored groups of computer experts also launch cyber
attacks. They're identified as nation-state attackers, and they have
been accused of attacking the information technology (IT) infrastructure
of other governments, as well as nongovernment entities, such as
businesses, nonprofits and utilities
❇️How do cyber attacks work ?
-
Threat actors use various techniques to launch cyber attacks, depending
in large part on whether they're attacking a targeted or an untargeted
entity.
- In an untargeted attack, where the bad actors are
trying to break into as many devices or systems as possible, they
generally look for vulnerabilities that will enable them to gain access
without being detected or blocked. They might use, for example,
a phishing attack, emailing large numbers of people with socially
engineered messages crafted to entice recipients to click a link that
will download malicious code.
- In a targeted attack, the threat
actors are going after a specific organization, and methods used vary
depending on the attack's objectives. The hacktivist group Anonymous,
for example, was suspected in a 2020 distributed denial-of-service
(DDoS) attack on the Minneapolis Police Department website after a Black
man died while being arrested by Minneapolis officers. Hackers also use
spear-phishing campaigns in a targeted attack, crafting emails to
specific individuals who, if they click included links, would download
malicious software designed to subvert the organization's technology or
the sensitive data it holds.
- Cyber criminals often create the
software tools to use in their attacks, and they frequently share those
on the so-called dark web.
- Cyber attacks often happen in
stages, starting with hackers surveying or scanning for vulnerabilities
or access points, initiating the initial compromise and then executing
the full attack -- whether it's stealing valuable data, disabling the
computer systems or both.
Share and Support😊
Don't forget to ask a question on comment box 👍
- Get link
- X
- Other Apps
Comments
Post a Comment