top of page

Common threats, Attacks and vulnerabilities

​

1. Threats in Cybersecurity

  • Malware (Malicious Software):

    • Viruses

    • Worms

    • Trojans

    • Ransomware

    • Spyware

    • Adware

    • Rootkits

  • Insider Threats:

    • Malicious insiders

    • Accidental insiders (human error)

  • Advanced Persistent Threats (APTs):

    • Nation-state actors or well-funded, organized criminal groups conducting prolonged and targeted attacks.

  • Phishing & Spear Phishing:

    • Generic phishing emails

    • Targeted spear-phishing attacks

  • Distributed Denial of Service (DDoS):

    • Flooding networks or servers with traffic to overwhelm and shut down services.

  • Social Engineering:

    • Manipulating individuals to reveal confidential information (e.g., via phone calls, phishing emails, or physical access).

  • Zero-day Exploits:

    • Attacks that exploit vulnerabilities before developers have created a patch.

  • Third-Party Vendor Risk:

    • Threats posed by compromised vendors or suppliers in an organization’s supply chain.

2. Types of Attacks

  • Network-based Attacks:

    • Man-in-the-Middle (MitM) Attacks: Intercepting communications between two parties.

    • Packet Sniffing: Monitoring data packets traveling over a network.

    • IP Spoofing: Masquerading as a trusted IP address to gain unauthorized access.

    • Session Hijacking: Taking over an active session between a user and a network service.

  • Web Application Attacks:

    • Cross-Site Scripting (XSS): Injecting malicious scripts into websites.

    • SQL Injection: Inserting malicious SQL queries into web forms to access or manipulate databases.

    • Cross-Site Request Forgery (CSRF): Trick users into executing unintended actions on web applications.

    • Server-Side Request Forgery (SSRF): Exploiting web servers to perform unauthorized requests.

  • Password Attacks:

    • Brute Force Attacks: Systematically attempting different passwords.

    • Dictionary Attacks: Using a precompiled list of common passwords.

    • Credential Stuffing: Using stolen credentials from one service to gain access to others.

    • Password Cracking: Techniques like rainbow tables to reverse-engineer hashed passwords.

  • Cryptographic Attacks:

    • Replay Attacks: Intercepting and retransmitting valid data to trick a system.

    • Birthday Attacks: Exploiting the mathematics of hash functions to find two inputs that produce the same output.

    • Side-Channel Attacks: Exploiting information leaked during encryption processes (e.g., timing, power consumption).

    • Weak Encryption: Attacks targeting outdated or weak encryption algorithms (e.g., DES, MD5).

  • Malware Attacks:

    • Botnets: Networks of compromised devices used for launching large-scale attacks.

    • Keyloggers: Recording keystrokes to steal sensitive data like passwords.

    • Ransomware: Encrypting data and demanding payment to restore it.

  • Physical Attacks:

    • Physical Device Compromise: Gaining physical access to a device to install malware or steal data.

    • USB-based Attacks: Using malicious USB devices to infect systems.

  • Cloud-based Attacks:

    • Data Breaches: Gaining unauthorized access to cloud-hosted data.

    • Account Hijacking: Stealing cloud user credentials for unauthorized access.

    • Misconfigured Cloud Services: Exploiting vulnerabilities or misconfigurations in cloud security settings.

3. Common Vulnerabilities

  • Unpatched Software:

    • Failure to apply updates or patches that fix known vulnerabilities in software or hardware.

  • Misconfigurations:

    • Default Passwords: Leaving default passwords unchanged.

    • Open Ports: Exposing unnecessary or vulnerable services.

    • Excessive Privileges: Granting more privileges to users or systems than necessary.

  • Weak Authentication Mechanisms:

    • Use of weak passwords or lack of multi-factor authentication (MFA).

  • Buffer Overflow:

    • Overwriting the memory of an application, allowing an attacker to execute arbitrary code.

  • Insecure APIs:

    • APIs with improper authentication, authorization, or lack of input validation can be exploited.

  • Cross-Site Scripting (XSS):

    • Web applications that don’t properly sanitize user input, allowing attackers to inject malicious scripts.

  • SQL Injection:

    • Inadequate input validation in web forms, allowing direct manipulation of databases.

  • Insecure File Uploads:

    • Allowing attackers to upload malicious files that can be executed on the server.

  • Directory Traversal:

    • Manipulating URLs to gain access to restricted directories or files.

  • Insecure Communication:

    • Using unencrypted communications (e.g., HTTP instead of HTTPS), making data vulnerable to interception.

4. Security Misconfigurations

  • Misconfigured Firewalls or Network Devices:

    • Weak rules, open ports, or overly permissive settings that expose networks to attacks.

  • Insecure Default Settings:

    • Using out-of-the-box configurations that are not secure by default, such as administrative accounts or services left enabled.

  • Improper Storage of Sensitive Data:

    • Storing data without encryption or using weak encryption standards.

  • Improper Access Controls:

    • Failing to properly implement access control measures, allowing unauthorized users to access sensitive resources.

5. Vulnerabilities in Emerging Technologies

  • Internet of Things (IoT) Vulnerabilities:

    • Weak authentication, insecure firmware updates, and exposure of sensitive data due to limited computational power of IoT devices.

  • Artificial Intelligence (AI) and Machine Learning:

    • Adversarial Attacks: Feeding malicious inputs to cause incorrect model outputs.

    • Data Poisoning: Manipulating training data to influence the behavior of ML models.

  • Blockchain Vulnerabilities:

    • 51% Attacks: Gaining majority control of the network to alter transactions.

    • Smart Contract Exploits: Exploiting bugs in decentralized, automated contract logic.

  • Cloud Computing Vulnerabilities:

    • Insecure APIs, misconfigured access controls, and multi-tenancy risks.

6. Vulnerabilities in Hardware

  • Firmware Vulnerabilities:

    • Exploiting bugs in firmware to take control of hardware devices.

  • Hardware Trojans:

    • Malicious circuits embedded into hardware components during the manufacturing process.

  • Side-Channel Attacks:

    • Gaining information from physical attributes like power consumption, electromagnetic leaks, or timing.

  • Meltdown and Spectre:

    • CPU vulnerabilities that allow unauthorized access to system memory.

  • facebook-square
  • Twitter Square
  • Google Square
bottom of page