What is a Cyber Attack?
Cyber Attack Definition
A cyber attack is the process of attempting to steal data or gaining unauthorized access to computers and networks using one or more computers. A cyber attack is often the first step an attacker takes in gaining unauthorized access to individual or business computers or networks before carrying out a data breach.
The goal of a cyber attack is either to disable the target computer and take it offline or gain access to the computer’s data and infiltrate connected networks and systems. Cyber attacks also differ broadly in their sophistication, with cyber criminals launching both random and targeted attacks on businesses. Attackers deploy a wide range of methods to begin a cyber attack, such as denial of service, malware, phishing, and ransomware.
A recent example is CMA CGM, one of the largest container shipping companies in the world. The firm suffered a cyberattack that originally targeted its servers, which then led to a data breach. The September 2020 attack occurred as malware was used to target the firm’s peripheral servers, which led to CMA CGM taking down access to its online services.
Cyber Attack News: How Often Do Cyber attacks Occur?
Cyber crime now occurs on a frequent basis, causing damage to individuals and businesses of all sizes. According to a research report from Risk Based Security, in the first six months of 2019 alone, approximately 4.1 billion records were exposed because of cyber attacks. This represented a 54% increase in reported breaches and a 52% rise in the number of records exposed.
Types of Cyber Attacks
Cyber criminals use a range of methods and techniques to gain unauthorized access to computers, data, and networks and steal sensitive information. Some of the most common types of cyber attacks are listed and expanded upon below.
Malware is malicious software designed to cause damage to computers, networks, and servers. There are different forms of malware, including Trojans, viruses, and worms, and they all reproduce and spread through a computer or network. This allows the hacker to gain deeper access into the target network to steal data, cause damage to devices, render networks inoperable, or take control of systems.
A phishing attack tricks a target into downloading malware or entering sensitive information into spoofed websites. These cyber attack methods are typically launched via email, with the attacker creating messages that look legitimate and may appear to be from a trusted sender. However, they will contain malware within an attachment or a malicious hyperlink that takes the recipient to a fake website that asks them to enter their login credentials or banking details.
Some phishing attacks take a blanket approach to try and catch as many victims as possible, but others are highly targeted and carefully researched to steal data from valuable individuals. Phishing is not restricted to email, however, as attacks are increasingly targeting mobile devices.
Ransomware attacks are a financially fueled form of malware attack. Attackers send messages containing a malicious attachment that, when downloaded, encrypts specific data and files or entire computers. The attacker will then demand a ransom fee from the victim and will only release or restore access to the data upon payment.
Ransomware attacks accounted for $8 billion of damage in 2018, of which only $1 billion came from ransom payments, and the rest was from reputational damage and lost revenue caused by downtime.
4. Denial of Service
A denial-of-service (DoS) attack is designed to prevent online services from working efficiently, also known as a brute-force attack. It is typically caused by an attacker flooding a website with huge amounts of traffic or requests, in an attempt to overwhelm its systems and take them offline. A more advanced DoS form is a distributed denial-of-service (DDoS) attack, through which an attacker takes control of several computers to overload its target.
5. Man-in-the-Middle (MITM)
MITM attacks enable a malicious actor to position themselves between the target victim and an online service the user accesses. An example of this is an attacker creating a spoofed, free-to-access Wi-Fi network. When the user connects to or signs in to the network, the attacker can steal the login credentials and data they use while on it.
Cryptojacking is financially motivated, and the method is designed to remain hidden from the target while using their computing resources to mine cryptocurrency. Often, the only sign of cryptojacking is a loss or reduction in computer performance or overactive cooling fans.
7. SQL Injection
Attackers use Structured Query Language (SQL) injection to exploit vulnerabilities and seize control of a database. Many websites and web applications store data in SQL and use it to share user data with databases. If an attacker spots a vulnerability in a webpage, they can perform an SQL injection to discover user credentials and mount a cyber attack.
In some cases, they may be able to alter and add data within a database, delete records, transfer money, and even attack internal networks.
8. Zero-day Exploits
Zero-day attacks target vulnerabilities in software code that businesses have not yet discovered, and as a result, have not been able to fix or patch. Once an attacker spots a code vulnerability, they create an exploit that enables them to infiltrate the business before it realizes there is a problem. They are then free to collect data, steal user credentials, and enhance their access rights within an organization.
Attackers can often remain active within business systems without being noticed for months and even years. Zero-day vulnerability exploit techniques are commonly available on the dark web, often for purchase by government agencies to use for hacking purposes.
9. DNS Tunneling
DNS tunneling is a cyber attack method that targets the Domain Name System (DNS), a protocol that translates web addresses into Internet Protocol (IP) addresses. The DNS is widely trusted, and because it is not intended for transferring data, it is often not monitored for malicious activity. This makes it an effective target to launch cyber attacks against corporate networks.
One such method is DNS tunneling, which exploits the DNS to tunnel malicious data and malware. It begins with an attacker registering a domain with the name server pointing to the attacker’s server, which has a tunneling malware program installed on it. The attacker infiltrates a computer and is free to send DNS requests through their server, which establishes a tunnel they can use to steal data and other malicious activity.
Why Do People Launch Cyber Attacks?
There are many reasons behind the launch of cyber attacks, from financial profit and business intelligence to cyber war and political gain.
- Financial gain: The main reason that people launch cyber attacks is for financial gain. Cyber attacks are typically cheap to create, build, and launch, but offer huge rewards. For example, the average cost of a data breach is a huge $3.86 million, according to a Ponemon Institute and IBM report.
- Business intelligence: Some cyber attacks are more business-motivated, with attackers using techniques like phishing to steal user credentials, infiltrate business networks, and access sensitive business information. More targeted attacks like whaling, which target senior executives and high-profile individuals, require vast amounts of research and planning, with the aim to steal highly sensitive data and potentially hold a business to ransom.
- State-sponsored attacks: Cyber attacks are also launched for political reasons, and many cyber attacks have been traced back to hackers working for nation-states. These include a Russian attack against the Ukrainian power grid in 2016 and the Iranian state-sponsored cyber attack group APT33. Nation-state-sponsored attacks have created a growing cyber war, which has seen the White House Military Office’s email system attacked by groups suspected of being backed by China.
- Hacktivism: Other cyber attacks are launched to raise political awareness, also known as hacktivism. Famous hacktivists, such as Anonymous and WikiLeaks, launch attacks against governments and large organizations to build awareness of various political issues, internet regulation and censorship, and government control.
- Personal reasons: Some cyber attacks are launched for personal reasons, usually by disgruntled or former employees. These individuals will steal sensitive data and sell it for profit or to damage an organization they feel treated them unfairly.
- White-hat hackers: A hacker may also launch a cyber attack for the thrill of it—or the intellectual challenge of gaining unauthorized access to a network. These attackers often do not have bad intentions but can cause damage to business systems. Other so-called white-hat hackers do it for good purposes and to help organizations improve their security defenses.
- Ease of data access: A key reason why hackers carry out cyber attacks is that data is readily available and easy for them to steal and profit from. For example, 38% of users have passwords that never expire, 61% of organizations have more than 500 users with passwords that will not expire, and 50% of business user accounts are stale or inactive, according to a Varonis data risk report.
What Are Examples of a Cyber Attack?
What is a cyber attack within the context of a business’s daily operations? The prevailing cyber attack definition can be very broad, depending on the kind of assault criminals decide to launch. Here are a couple of example scenarios:
- Malware: A company does not take the appropriate cyber attack prevention steps and allows its employees to visit any website they like. An employee goes to a fake site that automatically downloads malware onto their computer. The malware sets up a backdoor for a future ransomware attack.
- Phishing: A phishing email, one of the most common cyber attack types, gets sent to an employee telling them they need to update their bank account password. They are led to a fake site, and a hacker collects all the information they put in.
These cyber attack examples are fairly simple—not the sophisticated types some criminal syndicates unleash—but they are still some of the most common methods malicious actors use to exploit companies and their employees.
How Can a Cyber Attack Be Prevented?
Cyber attacks will continue to increase in frequency and sophistication. The good news is there are several things organizations can do to minimize their exposure, such as:
- Taking a proactive stance instead of merely detecting attacks and reacting to them
- Protecting all possible attack vectors in your organization
- 3Using the latest threat response and prevention technologies
- Ensuring you have an up-to-date threat intelligence system
- Making sure employees understand the methods hackers can use to try to breach your system
How Fortinet Can Help
It is vital that businesses do everything they can to keep their data, network, systems, and users safe from the threat of cyber attacks. This is reliant on keeping software up to date, using secure processes like encryption and multi-factor authentication (MFA), and securing their wireless networks.
It is also imperative for users to practice cybersecurity best practices, such as strong password and passwordless authentication, and for organizations to provide regular training on the threats that employees face. Organizations must also consider deploying sophisticated cybersecurity solutions that proactively protect businesses from both known threats and new, emerging cyber attack risks.
The Fortinet FortiGate next-generation firewall (NGFW) protects organizations from advanced cyber attack methods and adapts to keep them secure as the cyber threat landscape evolves. FortiGate enables businesses to identify attacks, discover malware, and block them before they pose a threat. Discover your organization’s cyber attack risk and potential vulnerabilities by completing the Fortinet cyber threat assessment.