
Updated · Mar 30, 2023
Updated · Feb 07, 2023
You may think you are aware of what lurks online, but I can assure you most of us have no actual idea how other people and the malware they’ve created can affect us, our machines, or our company.
That’s exactly why TechJury exists. To help you be prepared, to help you see what the majority can’t, and most of all - to be sufficiently informed about how the Web works.
Let’s start with some numbers to illustrate the damage cybersecurity attacks can cause, so we can get this show on the road.
In short, the term “cyber attack” applies to any situation where a hacker, or a group, attempts to compromise a computer system, network, or device with the intention of causing harm.
These attacks target anything from governments and companies to everyday online users. They vary in nature and have different ways of inflicting harm.
We can separate them into two major categories:
These two categories are divided into several types of cyberattacks, and we will examine them in detail in the next section.
The attacks we will discuss are probably the biggest threat to mankind right now. Even more than nuclear weapons, as Warren Buffet pointed out.
This is all the more reason to delve a little deeper and see the reasons behind such harmful activities. I will explain why attacks happen, who executes them, and who their victims are.
(Just like the Swedish pop group ABBA sang more than four decades ago.)
It’s the number one reason that motivates hackers to invent new ways to access a system. The numbers are, as you might expect, mind-blowing!
Cybersecurity attacks will cost the world economy up to $6 trillion in 2021, while the damage in 2015 was “only” $3 trillion.
Now, this is the total amount of money we will all spend one way or another for improving security. This includes hiring experts and covering the losses, suffered from companies and individuals. In that case, how much do cybercriminals actually earn?
Cybercrime generates $1.5 billion in profits, while individual cybercriminals earn up to $521 000 annually. And where do you think most hackers originate from? Care to guess? And the winner is.. China!
The P.R.C. is the home of cybercriminals, responsible for nearly 41% of all network attacks. Compare the income level we just mentioned to China’s minimum wage of $161.07-$348.02 (different for every province) and you can see how the lifestyle, which hacking provides, could be pretty tempting.
Here is how much each type of attacks contributes to the $1.5 billion in profits:
Internet activists, also known as hacktivists, use technology to further a political agenda or a social change. This may seem innocent in an ideological sense. However, most hacktivists look for and steal information that can harm their intended victim/s, or stop the normal functioning of their target organization.
The latter happens by performing a DoS attack (Denial-of-Service, see below for details), which could qualify as one of the major cyber attacks. A good example of a DoS attack is when in 2007 Estonia was hit by massive waves of traffic, aimed at different institutions. The result was the crashing of online banking services, media, and government bodies. This attack was also considered an example of cyber-warfare. Often hacktivists are hired to perform such attacks, using botnet armies in order to reach certain goals.
Most hackers, when asked, claim this is reason #1 for hacking. As you might expect, not all of these hackers actually break the law.
With that said, being able to execute different types of cybersecurity attacks and outsmart billion-dollar-corporations and governments might be more profitable on the wrong side of the law, for those who care about that sort of thing.
These are the three main motivators behind every cyber attack. We’ve covered the “Why”. Now let’s take a peek at the “Who”.
We’ve all seen hacker movies like “Hackers”, “Swordfish”, and “Blackhat”. They help paint the image of the hacker as a lone male with a dark hoodie.
You might already suspect this, but Hollywood largely romanticizes the hacker lifestyle for profit. This description actually fits only a small percentage of hackers. On the contrary, the main players behind major cyber attacks are :
In general, it could be anyone - individuals, companies, or government institutions.
The sky is the limit for hackers. In the UK alone almost half of the businesses (43%) and 19% of the charity organizations suffered a cyber attack in the last 12 months. The percentage rises to 72 among large-sized businesses.
As far as individuals go - over 1.5 million are victims to cybercrime every day! And 65% of global internet users have been victims of various cyber attack types.
To make this easier to process, here is a chart that shows you the most common targets of cyber crimes:
Individuals account for 30% of all attacks, despite the fact that any spoils from such attack would be miniscule in comparison. Still, this can easily be explained by the facts that 1) it is easier to hack a person than a company and 2) the aftermath of such attacks is way less harsh than if a hacker gets caught messing with an organization or a government body.
I already mentioned the two major intentions of cyberattacks. 1) to cripple or destroy a system or 2) to take control of it and/or its data. Now we will divide them into their more specific categories. Then we’ll take a look at how exactly each type of attack is conducted. We will also consider the measures you can take to protect yourself and/or your business. Without further ado, let me introduce you to the different types of cyberattacks:
Short for malicious software, malware is the main weapon of cyberattacks. It is designed to damage a system. Viruses, worms, trojans, and adware are all examples of malware, which you could see in our infographic. They are capable of rendering the computer or network inoperable or granting access to the attacker.
In the past malware was delivered manually to the system via a floppy disk or a CD. Nowadays 92% of malware is delivered by email.
The best way to prevent malware-caused infection in your system is to avoid spam emails. Also helps if you use an antivirus program and keep it regularly updated. This will go a long way to make you immune to being infected by malware.
Phishing attacks are typically delivered through email, posing as a request from a trusted source (your bank for example). They provide a link, leading to a fake site, often designed just like the real website. There, unsuspecting users would enter their personal information (like username and password), which at this point would be stolen. 56% of organizations identify phishing attacks as their biggest cybersecurity threat.
Via email.
Be sensible when reading your emails and browsing the web. Don’t open any attachments and links in emails that claim to come from trusted sources, unless you are 100% sure they’re legitimate. Another way to stay on the safe side is by using a password manager, which can determine the vulnerability of the pages you visit. Also, in order to avoid cyber threats, use the HTTPs protocol with sites that support it.
This is malware used for locking users out of their computer and then keeps them from accessing their information until a “ransom” is paid. Typically the payment is made to an anonymous wallet via Bitcoin or another cryptocurrency. More than 4000 ransomware attacks occur every day, so be careful.
By clicking compromised links in email or social networks, or via drive-by downloads.
The best way is to minimize the effects of such computer attacks taking place. Back up your files regularly and use the tips I gave you above. Also, it is advised never to pay the ransom if your computer is attacked.
These attacks aim to disrupt a network by sending huge volumes of traffic and data until the network is flooded and stops functioning. Its subtype - Distributed-Denial-of-Service (DDoS) is created by an army of botnet computers that attack the servers with overwhelming packages of data. The biggest example of such a network attack is the attack on GitHub, which knocked off the site by sending 1.35 Tb of data per second at its peak, while the site's average traffic was about 100 Gb/s.
In general, it is very hard to stop a DDoS attack once it starts. Your ISP can help by blackholing the traffic intended for your website.
There are also other attacks, like „Man-in-the-middle“, also known as eavesdropping. In this case, the criminal places himself between you and the network you are connected to in order to steal data.
Another popular type of cyber attacks is called Cryptojacking – when an actor uses your devices’ resources to mine cryptocurrencies without you knowing it. It installs a hidden piece of malware on your machine to achieve this. Just as a heads up - most of the attacks happen via emails.
The Web is a tricky place to navigate. Considering how much we’re dependent on the internet, it’s likely that WWIII will be fought entirely online.
Thankfully not all hackers are bad. The so-called White Hat Hackers are the opposite of the criminal elements that are performing different types of cyberattacks.
Granted, if cybercrime was a country it would have the GDP of Russia. Still, the world is investing more and more into cybersecurity. The success rate of focused cyberattacks is only 17% now and keeps going down. And while this is still a concerning number, it’s an indication of the things to come.
Hopefully, at this point, you have the basic idea of what a cyberattack is, and how to deal with one, if need be. Just before I say goodbye, just to lighten up the mood after all this talk about cyber attacks - here is an interesting fact:
Hackers stole 10 GB of data from an American casino. They gained access to the casino’s network via … a FISH TANK! The casino’s newly acquired attraction was apparently connected to a PC to monitor water cleanliness and temperature. With no security, it became an easy target for criminals, who used it as a gateway to the casino’s entire network. Pretty original, huh?
Best Antivirus Software
The Best Password Management Tools
Deyan Georgiev
Deyan has been fascinated by technology his whole life. From the first Tetris game all the way to Falcon Heavy. Working for TechJury is like a dream come true, combining both his passions – writing and technology. In his free time (which is pretty scarce, thanks to his three kids), Deyan enjoys traveling and exploring new places. Always with a few chargers and a couple of gadgets in the backpack. He makes mean dizzying Island Paradise cocktails too.
Latest from Author
Your email address will not be published.
Updated · Mar 30, 2023
Kris Soliongco
Updated · Mar 30, 2023
Updated · Mar 29, 2023
Updated · Mar 30, 2023