The spread of the internet and computer systems, as well as the growth of the technological market and the pandemic, increasingly create opportunities for hackers.
With the new general confinement, it is essential to find out about those that are the most common methods to threaten cybersecurity.
Malware is malicious software. Being one of the most common threats, it breaches a network through a vulnerability, usually through an unsolicited email attachment, a dangerous link or attachment, or a legitimate-looking download. Once inside the operating system, it can happen:
- Block access to the main components of the network (ransomware);
- Install additional malware or harmful software;
- Obtain information secretly when transmitting data from the hard disk (spyware);
- Harm certain components and render the system inoperable.
This software can be used by cyber criminals to make money from it or in politically motivated cyber attacks.
Dridex Malware is a kind of financial Trojan horse, infecting computers through phishing emails or existing malware. This Malware is capable of stealing passwords, bank information and personal data that can be used in fraudulent transactions.
In turn, Malware Emotet is very similar to Dridex, but it behaves differently, as it enters devices as a reminder of the importance of creating a secure password to protect against virtual threats.
Man-in-the-middle attacks occur when a cyber criminal intercepts communication between individuals in order to steal data. There are two major entry points for the MinM attack:
- In public and non-secure Wi-Fi, where hackers are inserted between the device and the network;
- By entering malware that violates the device, the attacker can install the software and process all user information.
A denial of service attack occurs when cybercriminals overload networks and servers with traffic to deplete resources and bandwidth. As a result, the system becomes unusable and unable to perform vital functions.
A SQL (Structured Query Language) injection is a type of attack that allows you to take control or steal data from a database. In other words, it happens when an attacker inserts malicious code on a server that uses SQL and forces it to reveal sensitive information contained in the database.
Zero-day exploitation happens when a network vulnerability is announced and before the fix or solution is implemented. Hackers target fragility during that time.
DNS tunneling takes place when an attacker encrypts data from other programs or protocols in DNS queries and responses and uses it to add data load to any DNS, gaining control or carrying out data extraction.
ActiveSys keeps you informed.