
Common threats, Attacks and vulnerabilities
​
1. Threats in Cybersecurity
-
Malware (Malicious Software):
-
Viruses
-
Worms
-
Trojans
-
Ransomware
-
Spyware
-
Adware
-
Rootkits
-
-
Insider Threats:
-
Malicious insiders
-
Accidental insiders (human error)
-
-
Advanced Persistent Threats (APTs):
-
Nation-state actors or well-funded, organized criminal groups conducting prolonged and targeted attacks.
-
-
Phishing & Spear Phishing:
-
Generic phishing emails
-
Targeted spear-phishing attacks
-
-
Distributed Denial of Service (DDoS):
-
Flooding networks or servers with traffic to overwhelm and shut down services.
-
-
Social Engineering:
-
Manipulating individuals to reveal confidential information (e.g., via phone calls, phishing emails, or physical access).
-
-
Zero-day Exploits:
-
Attacks that exploit vulnerabilities before developers have created a patch.
-
-
Third-Party Vendor Risk:
-
Threats posed by compromised vendors or suppliers in an organization’s supply chain.
-
2. Types of Attacks
-
Network-based Attacks:
-
Man-in-the-Middle (MitM) Attacks: Intercepting communications between two parties.
-
Packet Sniffing: Monitoring data packets traveling over a network.
-
IP Spoofing: Masquerading as a trusted IP address to gain unauthorized access.
-
Session Hijacking: Taking over an active session between a user and a network service.
-
-
Web Application Attacks:
-
Cross-Site Scripting (XSS): Injecting malicious scripts into websites.
-
SQL Injection: Inserting malicious SQL queries into web forms to access or manipulate databases.
-
Cross-Site Request Forgery (CSRF): Trick users into executing unintended actions on web applications.
-
Server-Side Request Forgery (SSRF): Exploiting web servers to perform unauthorized requests.
-
-
Password Attacks:
-
Brute Force Attacks: Systematically attempting different passwords.
-
Dictionary Attacks: Using a precompiled list of common passwords.
-
Credential Stuffing: Using stolen credentials from one service to gain access to others.
-
Password Cracking: Techniques like rainbow tables to reverse-engineer hashed passwords.
-
-
Cryptographic Attacks:
-
Replay Attacks: Intercepting and retransmitting valid data to trick a system.
-
Birthday Attacks: Exploiting the mathematics of hash functions to find two inputs that produce the same output.
-
Side-Channel Attacks: Exploiting information leaked during encryption processes (e.g., timing, power consumption).
-
Weak Encryption: Attacks targeting outdated or weak encryption algorithms (e.g., DES, MD5).
-
-
Malware Attacks:
-
Botnets: Networks of compromised devices used for launching large-scale attacks.
-
Keyloggers: Recording keystrokes to steal sensitive data like passwords.
-
Ransomware: Encrypting data and demanding payment to restore it.
-
-
Physical Attacks:
-
Physical Device Compromise: Gaining physical access to a device to install malware or steal data.
-
USB-based Attacks: Using malicious USB devices to infect systems.
-
-
Cloud-based Attacks:
-
Data Breaches: Gaining unauthorized access to cloud-hosted data.
-
Account Hijacking: Stealing cloud user credentials for unauthorized access.
-
Misconfigured Cloud Services: Exploiting vulnerabilities or misconfigurations in cloud security settings.
-
3. Common Vulnerabilities
-
Unpatched Software:
-
Failure to apply updates or patches that fix known vulnerabilities in software or hardware.
-
-
Misconfigurations:
-
Default Passwords: Leaving default passwords unchanged.
-
Open Ports: Exposing unnecessary or vulnerable services.
-
Excessive Privileges: Granting more privileges to users or systems than necessary.
-
-
Weak Authentication Mechanisms:
-
Use of weak passwords or lack of multi-factor authentication (MFA).
-
-
Buffer Overflow:
-
Overwriting the memory of an application, allowing an attacker to execute arbitrary code.
-
-
Insecure APIs:
-
APIs with improper authentication, authorization, or lack of input validation can be exploited.
-
-
Cross-Site Scripting (XSS):
-
Web applications that don’t properly sanitize user input, allowing attackers to inject malicious scripts.
-
-
SQL Injection:
-
Inadequate input validation in web forms, allowing direct manipulation of databases.
-
-
Insecure File Uploads:
-
Allowing attackers to upload malicious files that can be executed on the server.
-
-
Directory Traversal:
-
Manipulating URLs to gain access to restricted directories or files.
-
-
Insecure Communication:
-
Using unencrypted communications (e.g., HTTP instead of HTTPS), making data vulnerable to interception.
-
4. Security Misconfigurations
-
Misconfigured Firewalls or Network Devices:
-
Weak rules, open ports, or overly permissive settings that expose networks to attacks.
-
-
Insecure Default Settings:
-
Using out-of-the-box configurations that are not secure by default, such as administrative accounts or services left enabled.
-
-
Improper Storage of Sensitive Data:
-
Storing data without encryption or using weak encryption standards.
-
-
Improper Access Controls:
-
Failing to properly implement access control measures, allowing unauthorized users to access sensitive resources.
-
5. Vulnerabilities in Emerging Technologies
-
Internet of Things (IoT) Vulnerabilities:
-
Weak authentication, insecure firmware updates, and exposure of sensitive data due to limited computational power of IoT devices.
-
-
Artificial Intelligence (AI) and Machine Learning:
-
Adversarial Attacks: Feeding malicious inputs to cause incorrect model outputs.
-
Data Poisoning: Manipulating training data to influence the behavior of ML models.
-
-
Blockchain Vulnerabilities:
-
51% Attacks: Gaining majority control of the network to alter transactions.
-
Smart Contract Exploits: Exploiting bugs in decentralized, automated contract logic.
-
-
Cloud Computing Vulnerabilities:
-
Insecure APIs, misconfigured access controls, and multi-tenancy risks.
-
6. Vulnerabilities in Hardware
-
Firmware Vulnerabilities:
-
Exploiting bugs in firmware to take control of hardware devices.
-
-
Hardware Trojans:
-
Malicious circuits embedded into hardware components during the manufacturing process.
-
-
Side-Channel Attacks:
-
Gaining information from physical attributes like power consumption, electromagnetic leaks, or timing.
-
-
Meltdown and Spectre:
-
CPU vulnerabilities that allow unauthorized access to system memory.
-