viernes, 17 de enero de 2020

Find out about all cyber attack or computer attack


Find out about all cyber attack or computer attack

On computers and computer networks an attack is an attempt to expose, alter, destabilize, destroy, delete to gain unauthorized access or use an asset. A cyberattack or computer attack, is any offensive maneuver of deliberate exploitation that aims to take control, destabilize or damage a computer system (computer, private network, etc.). The attacker is an individual or organization that tries to gain control of a computer system to use it for malicious purposes, to steal information or to harm its target. An cyberattack uses malicious code, to corrupt codes, private data or algorithms, generating consequences that compromise and breach the security of information systems.

Some cyberattacks, depending on where it is carried out, to whom or when, are part of a computer war or a cyber-terrorism attack. Attacks are now more sophisticated in even more ingenious.

Phenix Direct describes it this way:

A computer attack also involves exploiting some vulnerability or weakness in software or hardware, mainly with the aim of gaining some economic benefit. Cyberattacks usually tend to be carried out by lone individuals. However, sometimes when the attacks are carried out together they are usually done by groups, organizations or gangs, who call themselves hackers, since they focus on doing harm through attacks known as computer crimes.

Consequences

Computer attacks often have consequences of different types, from small damage to personal computers to million-dollar damage. For example, americaeconomia.com is estimated to have been attacked by April 8 billion by April 2019 alone.

Trivial or minor damages are attacks that do not cause much damage or can cause loss of functionality in certain applications, such as a computer virus or information erasure. Severe or major damage is attacks that result in total loss of information or even physical damage, such as hard drive erasure, personal data theft, and even industrial attacks. A 2015 study found that in just 2 years this type of cyberattacks generated an increase of $512 million in 2012 to $800 million in 2014. For 2019 in the World Economic Forum's annual Occupational Risk Perception Survey, cyberattacks are considered among the top 10 threats most likely to occur, ranking fifth and seventh as the highest economic impact

Types of attacks

A cyberattack is any type of offensive maneuver made by individuals or organizations that attack information systems such as infrastructures, computer networks, databases that are hosted on remote servers, through acts malicious ones usually originated from anonymous sources that also steal, alter or destroy a specific target by hacking a vulnerable system.

Indistinct attacks

These attacks are broad, global and do not distinguish between governments, companies or civilians.

WannaCry ransomware attacks.
Operation Shady RAT, a series of persistent computer attacks that began in 2011 and ended up affecting more than 70 international organizations.
Stuxnet
World of Hell, a collective of hackers that claimed several high-level computer attacks, some of its targets were the Information Systems Defense Agency, Rolex, Hard Rock Café, etc.
Attack on Sony Pictures, it was an attack perpetrated by the North Korean group "Guardians of Peace" (GOP) in which more than 100TB of information was disclosed on the internet.
Red October, found in 2012, worked worldwide for a long time before its disclosure, transmitting data extending from conciliatory insider facts to individual data, including from cell phones.
Destructive attacks

These attacks refer to inflicting damage on specific organizations.

Great Hacker War. A war of two hacker groups, Masters of Deception (MOD) and Legion of Doom (LOD).
LulzRaft, a hacker group known for low-impact attacks in Canada.
Operation Ababil, conducted against American financial institutions.
Cyberattack and resulting breakup on TV5 Monde April 2015.
Vulcanbot
Shamoon, a modular computer virus, was used in 2012 in an attack on 30,000 Saudi Aramco workstations, causing the company to spend a week fixing its services.
Wiper - In December 2011, the malware successfully erased information from hard drives at the headquarters of the Ministry of Petroleum.

Cyber warfare
See also: Cyber Warfare
These are destructive, politically motivated attacks aimed at sabotage and espionage.

2007 cyberattacks in Estonia, extensive attack on government and commercial institutions.
2010 cyberattacks in Estonia, relating to the 2010 Burmese general elections.
2010 South Japan-Korea Cyber Warfare.
2013 cyberattacks in Singapore, attack by Anonymous "in response to web censorship regulations in the country, especially in the news media".
OpIsrael, a broad "anti-Israel" attack.
Cyberattacks during the Russian-Geogiana War.
Cyberattacks in July 2009, against South Korea and the United States.
Operation Olympic Games, against Iranian nuclear facilities, purportedly conducted by the United States.
Operation Tunisia, attack by Anonymous during the Tunisian Revolution.
Espionage to the government
These attacks relate to the theft of information from/about government organizations.

2010 Cyberattack in the United States, cyberespionage targeting U.S. Army computers.
Cyberattack during the G20 summit in Paris, directed towards G20 documents including financial information.
GhostNet.
Moonlight Maze.
Operation Newscaster, cyberespionage through a secret operation supposedly done by Iran.
Operation Cleaver, cyberwarfare through a secret operation supposedly done by Iran.
Shadow Network, attacks on India by China.
Titan Rain, directed at U.S. defense contractors.
Google - In 2009, Chinese hackers breached Google's corporate servers by gaining access to a database with classified information about suspected spies, agents and terrorists under the supervision of the U.S. government.
Gauss Trojan, found in 2012, is a state-supported PC spying activity that utilizations best in class programming to remove a great deal of delicate information from a large number of machines for the most part situated in the Middle East.
Office of Personnel Administration for Data Breach - December 2014, volation on U.S. government employee data.
Corporate Espionage
These attacks relate to the theft of data from corporations related to patented methods or emerging products/services.

Operation Aurora.

Operation Socialist, United Kingdom obtained information from a Belgian telecommunications company.
Hacking by Sony Pictures Entertainment.
Theft of email addresses and login credentials
These attacks refer to the theft of access information for specific web resources.

PlayStation Network outage in 2011, attack resulting from credential theft and causing network outages.

Gawker - by 2010, a band of anonymous hackers had settled on the site's servers and filtered half a gigabyte on private data.

IEEE - in September 2012, users, passwords and web activities of nearly 100,000 members were exposed.

LivingSocial - in 2014 the company suffered a security breach that exposed the names, emails and passwords of more than 50 million of its users.

RockYou - in 2009, the company suffered a security breach resulting in the exposure of more than 32 million accounts.

Yahoo!- In 2012, hackers revealed login credentials from more than 453,000 accounts. It was repeated in January 2013 and January 2014.

Theft of credit cards and financial data

Violation of information in JPMorgan Chase 2014, purportedly done by a group of Russian hackers.

MasterCard - In 2005, the company announced that 45.1 million cardholders may have suffered information theft from their accounts due to the hacking of payment processors.

VISA and MasterCard - in 2012, they warned bank card issuers that a third party of the payment processor suffered a security breach, affecting up to 10 million credit cards.

Metro - in 2012, two Romanian men confessed to partaking in a global connivance that hacked charge card installment terminals on in excess of 150 Subway establishments and took information from in excess of 146,000 records.
StarDust - in 2013, they compromised 20,000 cards in active campaign, affecting American merchants.

Target - in 2013, approximately 40 million credit and debit cards have reported to have been affected by a failure of those cards. As per another gauge, it traded off upwards of 110 million Target clients.

Goodwill Industries - In September 2014, the company suffered credit card failures that affected charitable retailers in at least 21 states.

Home Depot - In September 2014, cyber criminals who compromised Home Depot's network and installed malware on point-of-sale systems that roughly stole information from 56 million payment cards.

Medical data theft

In May 2015, three health organizations were attacked in the United States: Anthem Inc., Premera Blue Cross and CareFirst. All three attacks offset information on more than 91 million people.

Hacktivismo

Hay diversos tipos de ataques informáticos, algunos de ellos son:

Denial-of-service attack, also called a Denial of Service (DoS) attack, is an attack on a computer system or network that causes a service or resource to be inaccessible to legitimate users, usually causing the loss of network connectivity by consumption of the victim's network bandwidth or overload of the victim's system computational resources.
Man in the middle, sometimes abbreviated mitM, is a situation where an attacker (usually through a port tracker) monitors communication between two parties and falsifies exchanges to impersonate one of them.
Re-injection attacks, a form of network attack, in which a valid data transmission is malicious or fraudulently repeated or delayed. It is carried out by the author or by an adversary that intercepts the information and relays it, possibly as part of a masked attack.
Zero-day attack, attack carried out against a computer, from which certain vulnerabilities are exploited, or security holes of any program or programs before they are known, or that, once the existence of the vulnerability is published, is carry out the attack before the release of the patch that solves it.

Logical attacks

Trashing:
This usually occurs when a user writes down their login and password on a piece of paper and then, when they remember, throws it away. This, however innocent it may seem, is the one an attacker can take advantage of to make a key to enter the system.

Monitoring:

This type of attack is done to observe the victim and his system, with the aim of establishing their vulnerabilities and possible forms of future access.

Authentication Attacks:

This type of attack aims to trick the victim's system into entering it. Usually this deception is done by taking the sessions already established by the victim or getting their username and password (their most common form is to receive an email with a fake shortcut link from the most visits pages).

Denial of Service(DoS):

Existing protocols were now designed to be made in an open community and with a relationship of mutual trust. The reality indicates that it is easier to disorganize the operation of a system than to access it; thus, Denial of Service attacks aim to overwhelm the victim's resources in such a way that the services provided by the victim are disabled.

Modification (damage):
modification or damage can be given as:

Tampering or Data Diddling:

This category refers to unauthorized modification of the data or SOFTWARE INSTALLED on the victim system (including file deletion).

Footprint Erase:

Fingerprint erasure is one of the most important tasks that the intruder must perform after entering a system, because, if his/her income is detected, the administrator will look for how to get "to plug the gap" security, prevent future attacks and even track the Attacker.

Other attacks

Brute force attack. It is not necessarily a procedure to be performed by computer processes, although this system would save time, energy and effort. The brute force attack system tries to recover a key by testing all possible combinations until it finds the one that is searched, and that allows access to the system, program or file under study.

No hay comentarios:

Publicar un comentario