SlideShare a Scribd company logo
6 most dangerous cyberattacks
TARWALA INSIYA Z.
T.Y.-C.E-1
110410107028
INDEX
1) INTRODUCTION
2) CRYPTOLOCKER
3) SPEAR PHISHING
4) TIMTHUMB ATTACK
5) MANIPULATING BEEF TOOLKIT
6) SEO POISONING
7) PHISHING + SOCIAL ATTACK
 Cyber-attack is any type of offensive maneuver employed by
individuals or whole organizations that targets computer
information systems, infrastructures, computer networks, and
personal computer devices by various means of malicious acts
usually originating from an anonymous source that either steals,
alters, or destroys a specified target by hacking into a susceptible
system.
 These can be labelled as either cyberwarfare or cyberterrorism in
different context. Cyber-attacks can range from
installing spyware on a PC to attempts to destroy the infrastructure
of entire nations.
 Cyber-attacks have become increasingly sophisticated and
dangerous and a preferred method of attacks against large groups
by attackers.
INTRODUCTION
CryptoLocker
 The CryptoLocker virus can be a lethal one-two punch: It seizes control of
your computer files and threatens to erase them unless you pay a ransom.
 Cybercriminals email you a PDF attachment. If you open the attachment, it
installs malware on your hard drive that lets hackers access your
computer files. The files are then encrypted and you're unable to access
them.
 Within two days, the hackers will email saying if you don't pay up, your
documents will be deleted.
 Attackers typically demand payment via hard-to-trace Bitcoin -- a virtual
currency -- and not in cash or credit card.
 Small businesses are particularly vulnerable to this attack because many
haven't adequately protected file-sharing between employees.So if one
employee's computer is compromised, then every document that the
company owns can be locked.
Spear Phishing
 Spear Phishing is a targeted attack using emails that look like
they're from someone in your company or a commonly used
business.
 So instead of an email from a random bank about your non-
existent account, hackers send an email that looks like it's from
the HR office in your firm or a service like Groupon or
Travelocity.
 If you click the link in the email, it takes you to a fake page, and
hackers are able to attach malware to your browser.They'll
verify your email address and check your browser history.
 If you logged into your online bank account just prior to the
attack, for example, cybercriminals might send a fraudulent
email saying you need to change your password for security
reasons. Now they've just captured your banking information.
 Additionally, hackers can use your online activity to determine
which social networks you use and where you shop most
frequently, and then send more phishing emails that look like
they've originated from those sites.
Timthumb attack
 In this attack, hackers exploit a security flaw in a popular file used by
Wordpress and other website-building platforms to crop and resize images
("Timthumb.php," thus the name).
 Hackers use the security hole to install malicious code or files into a
website or server. From there, they can launch spear phishing campaigns
and denial-of-service attacks -- where hackers overwhelm a website's
server by flooding it with requests, making the site unresponsive.
 Timthumb attacks have hit millions of websites over the last two years,
most of which have been small businesses.
 Business owners often don't even know that their sites have been infected
because it works silently, adding that the security flaw can be fixed with a
patch.
 By then, the damage has been done. Moreover, an infected website that's
launching DoS attacks also runs the risk of being blacklisted by Google.
Manipulating BeEf Toolkit
 BeEF Toolkit, short for Browser Exploitation Framework, is
software that experts use to test the security of a firm's
network. But cybercriminals can also use it to steal trade
secrets or financial information from unsuspecting businesses.
 Hackers will send a carefully crafted phishing email with a
malicious link. When the link is clicked on, it activates the BeEF
Toolkit software, which hooks on to your browser and allows
hackers to shadow your activity.
 Hackers are then able to see your most-visited websites, your
searches and your other online activity without you knowing it.
In some cases, cybercriminals can also inject malware that
sniffs for passwords on the computer.
 Most small businesses aren't aware that patches exist to fix
these loopholes. So Businesses need to become more aggressive
about securing their browsers.
SEO poisoning
 SEO begins with hackers isolating keywords that are generating buzz
on Google and other search engines. They then create malicious URLs
about this topic so that search engines will index it alongside other
results.
 Suppose thousands of people are Googling "Miley Cyrus." In this attack,
cybercriminals would create dummy websites about her that are loaded
with malware.
 If you're searching for Miley and unwittingly click on one of these links,
the malware could be used to hack into your computer or install
spyware.
 There's another risk to small businesses. Because SEO poisoning floods
search results with bad links, it could push legitimate results down.
 Suppose you sell Miley Cyrus T-shirts online and you're expecting an
uptick in business when "Miley Cyrus" is a hot search trend, But with so
many bad results that come up, people might not even get to [your] link.
Phishing + social attack
 Hackers have upped the ante with this targeted attack, using
personal phone calls in addition to traditional emails.
 It begins as a regular phishing email to people with financial
roles, such as an accountant or a CFO.
 The scary part is that even if you think the email is suspicious
and don't click on it, you haven't escaped the attack.
 The criminals pretend to be a vendor of the [targeted] company
and will convince you that you have a payment due on an old
invoice. The victim gets a follow-up email with an attachment
disguised as the invoice.
 If you click on the attachment, it will install malware on your
computer. Then the hackers can get information such like the
login and password for bank accounts and steal funds.
Cyber Attacks

More Related Content

What's hot

10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
Cyber security professional services- Detox techno
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?
AariyaRathi
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
What is Phishing - Kloudlearn
What is Phishing - KloudlearnWhat is Phishing - Kloudlearn
What is Phishing - Kloudlearn
KloudLearn
 
Ransomware
RansomwareRansomware
Ransomware
DeepakKumar4980
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
ITNet
 
Network Threats
Network ThreatsNetwork Threats
Network Threats
Dan Oblak
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
KloudLearn
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
Amna
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
MOHAMMADZAINULABIDEE3
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
Datto
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Small Business
 
The need for security
The need for securityThe need for security
The need for security
Saman Sara
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
Martins Chibuike Onuoha
 
Malicion software
Malicion softwareMalicion software
Malicion software
A. Shamel
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Avinash Navin
 

What's hot (20)

10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
What is Phishing - Kloudlearn
What is Phishing - KloudlearnWhat is Phishing - Kloudlearn
What is Phishing - Kloudlearn
 
internet security
internet securityinternet security
internet security
 
Ransomware
RansomwareRansomware
Ransomware
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
 
Network Threats
Network ThreatsNetwork Threats
Network Threats
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
The need for security
The need for securityThe need for security
The need for security
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 
Malicion software
Malicion softwareMalicion software
Malicion software
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 

Similar to Cyber Attacks

A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
Business.com
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docx
MehwishAnsari11
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
Gaurav Patel
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
ronpoul
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
ronpoul
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
NimishaRawat
 
Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
Blue Coat
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
The Lifesciences Magazine
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
seadeloitte
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
RapidSSLOnline.com
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guideGary Gray, MCSE
 
Learn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf SecurityLearn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf Security
Aardwolf Security
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
DrPraveenKumar37
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
ssuser8b4eb21
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
SibyJames1
 
Cloning Attack-Unveiling the Stealthy Threat.pdf
Cloning Attack-Unveiling the Stealthy Threat.pdfCloning Attack-Unveiling the Stealthy Threat.pdf
Cloning Attack-Unveiling the Stealthy Threat.pdf
Time Speed Magazine
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internetAlexander Decker
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Sukhdev48
 

Similar to Cyber Attacks (20)

A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docx
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
 
Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
Learn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf SecurityLearn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf Security
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Cloning Attack-Unveiling the Stealthy Threat.pdf
Cloning Attack-Unveiling the Stealthy Threat.pdfCloning Attack-Unveiling the Stealthy Threat.pdf
Cloning Attack-Unveiling the Stealthy Threat.pdf
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

Cyber Attacks

  • 1. 6 most dangerous cyberattacks TARWALA INSIYA Z. T.Y.-C.E-1 110410107028
  • 2. INDEX 1) INTRODUCTION 2) CRYPTOLOCKER 3) SPEAR PHISHING 4) TIMTHUMB ATTACK 5) MANIPULATING BEEF TOOLKIT 6) SEO POISONING 7) PHISHING + SOCIAL ATTACK
  • 3.  Cyber-attack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.  These can be labelled as either cyberwarfare or cyberterrorism in different context. Cyber-attacks can range from installing spyware on a PC to attempts to destroy the infrastructure of entire nations.  Cyber-attacks have become increasingly sophisticated and dangerous and a preferred method of attacks against large groups by attackers. INTRODUCTION
  • 5.  The CryptoLocker virus can be a lethal one-two punch: It seizes control of your computer files and threatens to erase them unless you pay a ransom.  Cybercriminals email you a PDF attachment. If you open the attachment, it installs malware on your hard drive that lets hackers access your computer files. The files are then encrypted and you're unable to access them.  Within two days, the hackers will email saying if you don't pay up, your documents will be deleted.  Attackers typically demand payment via hard-to-trace Bitcoin -- a virtual currency -- and not in cash or credit card.  Small businesses are particularly vulnerable to this attack because many haven't adequately protected file-sharing between employees.So if one employee's computer is compromised, then every document that the company owns can be locked.
  • 7.  Spear Phishing is a targeted attack using emails that look like they're from someone in your company or a commonly used business.  So instead of an email from a random bank about your non- existent account, hackers send an email that looks like it's from the HR office in your firm or a service like Groupon or Travelocity.  If you click the link in the email, it takes you to a fake page, and hackers are able to attach malware to your browser.They'll verify your email address and check your browser history.
  • 8.  If you logged into your online bank account just prior to the attack, for example, cybercriminals might send a fraudulent email saying you need to change your password for security reasons. Now they've just captured your banking information.  Additionally, hackers can use your online activity to determine which social networks you use and where you shop most frequently, and then send more phishing emails that look like they've originated from those sites.
  • 10.  In this attack, hackers exploit a security flaw in a popular file used by Wordpress and other website-building platforms to crop and resize images ("Timthumb.php," thus the name).  Hackers use the security hole to install malicious code or files into a website or server. From there, they can launch spear phishing campaigns and denial-of-service attacks -- where hackers overwhelm a website's server by flooding it with requests, making the site unresponsive.  Timthumb attacks have hit millions of websites over the last two years, most of which have been small businesses.  Business owners often don't even know that their sites have been infected because it works silently, adding that the security flaw can be fixed with a patch.  By then, the damage has been done. Moreover, an infected website that's launching DoS attacks also runs the risk of being blacklisted by Google.
  • 12.  BeEF Toolkit, short for Browser Exploitation Framework, is software that experts use to test the security of a firm's network. But cybercriminals can also use it to steal trade secrets or financial information from unsuspecting businesses.  Hackers will send a carefully crafted phishing email with a malicious link. When the link is clicked on, it activates the BeEF Toolkit software, which hooks on to your browser and allows hackers to shadow your activity.  Hackers are then able to see your most-visited websites, your searches and your other online activity without you knowing it. In some cases, cybercriminals can also inject malware that sniffs for passwords on the computer.  Most small businesses aren't aware that patches exist to fix these loopholes. So Businesses need to become more aggressive about securing their browsers.
  • 14.  SEO begins with hackers isolating keywords that are generating buzz on Google and other search engines. They then create malicious URLs about this topic so that search engines will index it alongside other results.  Suppose thousands of people are Googling "Miley Cyrus." In this attack, cybercriminals would create dummy websites about her that are loaded with malware.  If you're searching for Miley and unwittingly click on one of these links, the malware could be used to hack into your computer or install spyware.  There's another risk to small businesses. Because SEO poisoning floods search results with bad links, it could push legitimate results down.  Suppose you sell Miley Cyrus T-shirts online and you're expecting an uptick in business when "Miley Cyrus" is a hot search trend, But with so many bad results that come up, people might not even get to [your] link.
  • 16.  Hackers have upped the ante with this targeted attack, using personal phone calls in addition to traditional emails.  It begins as a regular phishing email to people with financial roles, such as an accountant or a CFO.  The scary part is that even if you think the email is suspicious and don't click on it, you haven't escaped the attack.  The criminals pretend to be a vendor of the [targeted] company and will convince you that you have a payment due on an old invoice. The victim gets a follow-up email with an attachment disguised as the invoice.  If you click on the attachment, it will install malware on your computer. Then the hackers can get information such like the login and password for bank accounts and steal funds.