Information Security Threats
Sajeev Raj Maruthan CISM
Information Security and Governance Manager at Aventra Group
In the previous episodes of our Information Security 101 series, we looked into the fundamentals of information security and explored the concepts of the CIA Triad (Confidentiality, Integrity, Availability) and AAA Triad (Authentication, Authorization, Accounting). Now, it's time to dive deeper into the world of threats that constantly challenge the security of our digital landscapes.
Understanding these threats is essential for building robust defense mechanisms.
Let's explore the most common types of threats:
Malware, short for malicious software, is a collective term for various software programs designed to infiltrate, damage, or gain unauthorized access to computer systems and networks. Types of malware include viruses, worms, Trojans, ransomware, spyware, and adware.
Phishing is a cyber-attack that involves tricking individuals into revealing sensitive information, such as passwords, credit card numbers, or personal details, by posing as a trustworthy entity through emails, messages, or websites.
Social engineering attacks exploit human psychology rather than technical vulnerabilities. Attackers manipulate individuals into divulging confidential information, performing actions, or compromising security measures.
DoS attacks aim to disrupt the availability of a service by overwhelming a system with excessive traffic. DDoS attacks involve multiple sources coordinating to inundate a target, causing a more severe impact.
Data breaches involve unauthorized access, acquisition, or exposure of sensitive data, often resulting in identity theft, financial loss, or reputational damage. Breaches can occur due to various vulnerabilities, such as weak authentication or unpatched software.
Insider threats originate from individuals within an organization who misuse their access privileges to compromise security. These threats can be unintentional, such as negligence, or deliberate, such as disgruntled employees seeking to harm the organization.
A zero-day exploit takes advantage of a vulnerability in software that is unknown to the vendor. Hackers exploit this window of opportunity before a patch is released, potentially causing significant damage.
APTs are prolonged and targeted cyber-attacks often orchestrated by well-funded and highly skilled adversaries. These threats persistently infiltrate networks to steal sensitive data, conduct espionage, or establish long-term footholds
Ransomware encrypts a victim's files or entire system, demanding a ransom for decryption. It has become a major threat, causing data loss and financial harm to individuals and organizations.
In MitM attacks, an attacker intercepts communication between two parties without their knowledge. This enables the attacker to eavesdrop, alter messages, or steal sensitive information.
Drive-by downloads occur when a user visits a compromised website and unintentionally downloads malware onto their system. These attacks exploit vulnerabilities in web browsers or plugins.
A brute-force attack involves systematically trying all possible combinations of passwords until the correct one is found. The "RockYou" breach exposed weak passwords and demonstrated the dangers of using easily guessable ones.
Attackers use JavaScript code on compromised websites to mine cryptocurrency using visitors' CPU resources without their consent. "Coinhive" was a notorious cryptojacking script often embedded in websites.
Many IoT devices ship with default passwords that users often neglect to change. The "Mirai" botnet exploited such devices to launch DDoS attacks.
领英推荐
Attackers can physically tamper with hardware to install backdoors or compromise the integrity of devices. This threat was highlighted by the "BadUSB" attack, which exploited USB firmware vulnerabilities.
Attackers intercept wireless communications, such as Wi-Fi signals, to capture sensitive data transmitted between devices. "KRACK" (Key Reinstallation Attack) demonstrated vulnerabilities in Wi-Fi security protocols.
Attackers can modify device firmware to render it unusable or "bricked." This type of attack was seen with certain home routers that were remotely bricked by attackers.
Attackers can compromise hardware components during the manufacturing process, allowing them to gain unauthorized access to devices. The "Supermicro" incident alleged that servers were implanted with hardware backdoors.
Fileless malware operates in system memory, leaving minimal traces on disk. The "PowerShell Empire" framework can be used to execute fileless attacks via PowerShell scripts.
Attackers manipulate DNS settings to redirect users to malicious websites that impersonate legitimate ones. "DNSChanger" malware was used to redirect victims to fraudulent sites.
Whaling attacks focus on high-profile individuals. An example is the "CFO Fraud," where attackers impersonate executives to trick employees into making fraudulent wire transfers.
Attackers register domains with slight misspellings of popular websites to catch users who mistype URLs. A typosquatting domain might look like "www.googel.com."
Attackers compromise websites frequently visited by their target audience, infecting visitors with malware. The "Operation Aurora" attack used watering hole tactics against high-profile targets.
Attackers leave infected USB drives in public spaces, relying on curiosity to entice victims into plugging them into their devices, unknowingly installing malware.
Attackers trick mobile carriers into transferring a victim's phone number to a new SIM card they control. This allows them to bypass two-factor authentication and gain unauthorized access.
Blind SQL injection attacks manipulate an application's response to uncover hidden vulnerabilities in the database. Attackers can infer the results of their actions from the application's behavior.
Including malicious files on a web server to execute arbitrary code.
How to Protect ourselves from Cyberthreats ?
For Enterprises:
For Individuals:
In our exploration of information security, we've uncovered the diverse threats impacting data security. From malware to phishing, we've navigated this complex landscape. In our next episode, we'll focus on "Social Engineering" tactics, delving into their psychology and defense strategies. Stay tuned as we empower you to protect yourself and your organization. Knowledge is your best defense in this ever-evolving security landscape.