Backdoor attacks
A backdoor attack refers to gaining access to a system or network by bypassing security mechanisms. Once an attacker has gained access, they can then install malicious software or perform other malicious actions.
Formjacking
Formjacking is a type of cyber attack where malicious code is injected into a web page that uses a form. The injected code collects sensitive information (such as credit card details) from unsuspecting users who use the form. The stolen information is then sent to the attacker, who can use it for fraudulent purposes.
Learn more about formjacking
Cryptojacking
Cryptojacking is a type of cyber attack in which a criminal hacker hijacks a victim’s computer to mine cryptocurrency. The hacker typically does this by embedding malicious code in a website or email, which causes the victim’s computer to mine cryptocurrency without their knowledge or consent. This can slow down the victim’s computer and consume their electricity, which can lead to higher bills. In some cases, cryptojacking can also cause physical damage to the victim’s computer.
DDoS attacks
A DDoS (distributed denial-of-service) attack is a type of cyber attack in which a malicious actor tries to disrupt a network by overwhelming it with traffic from multiple sources. This can be done by overloading the target with illegitimate requests or by sending a large amount of data to overload its systems.
Learn more about DDoS attacks
DNS poisoning attacks
DNS poisoning is a type of DNS attack where malicious actors change the records that a server uses to direct traffic to the right websites. This can cause the name server to return the wrong IP address for a given domain name, redirecting traffic intended for a legitimate website to the attacker’s website. DNS poisoning can be used to carry out a variety of attacks, including man-in-the-middle attacks, phishing attacks and distributing malware.
Malware
Malware is a type of software that is designed to harm a computer, server, or network. It can be used to steal information, delete files, or damage equipment. This includes:
Botnet software is a type of malware that allows attackers to control a network of infected computers, or ‘bots’. Botnets can be used to perform a variety of tasks, including launching attacks, stealing data, or sending spam.
Ransomware is a type of malware that encrypts a user’s files and demands a ransom be paid to decrypt them. Paying a ransom does not necessarily guarantee that you will be able to recover the encrypted data.
A RAT (remote-access Trojan) is a malware program that gives an attacker access to a victim’s computer. The attacker can then control the victim’s computer remotely, without the victim’s knowledge or consent. RATs are often used to spy on the victim, or to steal sensitive information from the victim’s computer.
A rootkit is a type of malicious software that allows attackers to gain administrator-level access to a system. Rootkits can be used to stealthily install other malicious software on a system, such as viruses, Trojans and backdoors. They can also be used to hide the presence of other malware, such as botnets. Rootkits are often used by attackers to maintain access to a system after they have gained initial access.
Bootkits are a type of rootkit that can infect start-up code – the software that loads before the operating system.
Spyware is a type of software that is installed on a computer without the user’s knowledge. It is designed to collect information about the user, such as their web browsing habits, and send it to the creator of the spyware.
A Trojan is a type of malware that is designed to gain access to a computer by disguising itself as a legitimate file or program. Trojans can be used to steal personal information, install other forms of malware, or take control of a victim’s machine.
A computer virus is a piece of malicious code that is installed without the user’s knowledge. Viruses can replicate and spread to other computers by attaching themselves to other computer files.
Worms are like viruses in that they are self-replicating. However, they do not need to attach themselves to another program to do so.