15 types of cyber attack
By Dan Colombini04 November 2021
Cyber attacks on rental equipment firms are on the rise, with Palfinger and Adapteo becoming high-profile victims of the problem.
But what specific types of attack are currently posing a threat?
Effective measures are being put in place as the issue becomes more prevalent but it remains a sophisticated issue with varying methods in effect to cause problems for an organisation.
Using information from data security platform Lepide, we look a the different types of threat that are affecting the sector…
Applications, including ransomware, that perform malicious tasks from spying to obtaining valuable data or causing disruption.
Designed to trick a victim into handing over information, such as passwords, credit card details or intellectual property.
Man-in-the-middle attack (MITM)
The attacker intercepts the communication between two parties to spy on victims or steal information.
Distributed Denial-of-Service (DDoS) attack
An attacker uses multiple devices to flood a target server with traffic to disrupt or bring down the target.
SQL databases uses SQL statements to query data typically executed via a HTML form on a webpage. If permissions are not set correctly, the HTML form can be exploited.
Cyber-criminals exploit an existing vulnerability in software applications and operating systems, before a fix becomes available.
DNS tunnelling provides attackers with persistent access to a given target.
Business Email Compromise (BEC)
The attacker targets individuals, perhaps those with the ability to authorise financial transactions.
Criminals compromise a user’s computer or device and use it to mine cryptocurrencies, such as Bitcoin.
A victim visits a website which in turn infects their device with malware.
Cross-site scripting (XSS) attacks
Similar to SQL injection attacks, these infect other users who visit the site or redirect the user to a malicious website.
An attacker cracks a user’s password, sometimes using phishing.
Attackers look for unsecured network communications to intercept and access data being sent across the network.
AI-powered software can learn what kinds of approaches work best and adapt attack methods.
Hackers may seek to compromise IoT devices in order to launch large-scale DDoS attacks.