CyberAttacks Types and Techniques.



This content originally appeared on DEV Community and was authored by Mahima Bhardwaj

Phishing– It is one of the most common cyberattacks used by attackers to deceive individuals into revealing their sensitive information through misleading communication.

Image description

Types of Phishing

  • Vishing
  • Smishing -** Pharming**
  • Whaling

1> Vishing – In this type of phishing, malicious actors use voice communication—often via phone calls or voice messages—to deceive individuals into providing sensitive information, such as:

  • Credit card numbers
  • Bank details
  • Personal data

Image description

2> Smishing – is a type of phishing attack conducted via SMS (Short Message Service). In this method, attackers send text messages that often appear to come from a trusted source, such as a bank, service provider, or other reputable organization. The goal of these messages is to lead you to a malicious website, where they can steal your personal information.

Image description

3> Pharming – Impersonating Legitimate website to steal user credential.

Image description

4> Whaling – In this technique attacker will target High-Profile individuals like politicians or celebrities.

Image description

What is Malware
It is a software that is designed to harm , disrupt or gain unauthorized access to a computer ,server or network. It can steal Data, Damage systems or allow unauthoruzed access to sensitive information.

Types of Malware includes

1>Virus – It attaches itself to file and spreads when those file opened or run.

2> Worm– It replicates itself and spreads across networks without user interaction.It slows down computer or network.They run by themselves they don’t need user interaction.

3> Ransomware – it usually works by encripting data with a key unknown to the user. Payment through an Untraceable payment system is always the criminal’s goal.

Social Engineering
It used to manipulate individuals into divulging sensitive information, performing specific actions , or compromising their security.This type of attack exploits human psychology, trust and natural behaviour to gain unauthorized access to syatems.

Shoulder Surfing
A criminal observes , or shoulder surfs, to pick up PINs, access codes or credit card numbers.

*Distributed DoS Attack (DDoS) *


This content originally appeared on DEV Community and was authored by Mahima Bhardwaj