Over the past ten years, the digital sector has made significant progress. This digital revolution, as advantageous as it is for companies, also brings its share of problems. The latter are constantly the target of hackers, who do not hesitate to use all possible stratagems to achieve their ends. The scope of these hackers is not limited to organizations, since they also target people like you and me. Here is a file exclusively devoted to cyberattacks which learns more about it.

Summary
  1. Definition of a cyberattack
  2. How does a cyberattack work?
  3. How do hackers manage to take control of a computer system?
  4. The different types of cyber attack

Definition of a cyberattack

cyber attack or computer attack means any attempt to gain unauthorized access to an IT system or a personal computer with the sole intention of causing damage. These malicious acts are the work of hackers better known as hackers. However, IT systems contain a large amount of data. As a result, by having access to it, hackers can, depending on their purpose, modify, block, manipulate or steal said data.

How does a cyberattack work?

In order to understand how a cyberattack works, we are going to put ourselves in the shoes or rather in the head of a hacker. To attack a computer system, the hacker proceeds in 7 steps. The ones we present to you relate to the Cyber ​​Kill Chain method. This is a method developed in 2011 by Lockheed Martin:

  • Recognition : also called identification of the target, this step aims to collect as much information as possible about the target (company or natural person);
  • Arming : at this stage, the hacker uses the information collected to define a means of infiltration on the computer system of the victim. To do this, it uses malicious software (or malware);
  • Delivery : here, the attacker aims to collect the real authentication parameters of the target in order to use them later. The hacker delivers the infiltration weapon through emails, social media interactions, or physical media such as USB drives;
  • Exploitation : once the victim opens the email, the attachment, or inserts the key into his computer, he makes himself vulnerable. A vulnerability exploited by the hacker to access the victim’s information system;
  • Installation : if we are at this stage, it will mean that the hacker has already accessed his target’s IS. Now he seeks to control it over a relatively long period of time. To do this, the attacker installs a backdoor or a backdoor;
  • Command and control : The malware installed in the previous step opens a channel. It is through this channel directly connected to the hacker that the latter can communicate with the target’s IS. The software executes the hacker’s commands. Commonly used channels are based on DNS, email, or web protocols;
  • The attack : this is the last stage of the process. It consists of executing the initial purpose of the cyberattack. This goal expresses the hacker’s motivation.
See also  WiFi Guard: detect WiFi squatters
A hacker launching a cyberattack

How do hackers manage to take control of a computer system?

In principle, a computer is protected by a firewall and an antivirus. The role of the firewall is to filter connections coming from outside. As for the antivirus, it is used to detect and delete malicious files.

However, firewall and antivirus are not infallible. If they leave a gap or a doorway, then the hacker just has to use it to send his attack and infiltrate the computer.

The different types of cyber attack

Cyberattacks come in four main forms: cybercrime, sabotage, espionage and image damage. As for the 10 most common types of cyberattacks, these are DDoS attacks (or denial of service attacks); malware; phishing or phishing; stealth downloading (or Drive by Download ); password cracking, SQL injection; the man – in-the-middle attack ; cross-site scripting; eavesdropping and the birthday attack.

5/5 - (1 vote)