Methods used for cybercrime/Cyber Attack
Phishing: It is a kind of fraudulent attempt that is made through email, to capture personal and financial information.
Cyber Stalking : Repeated use of electronic communications to harass or frighten someone Identity theft It is a type of fraud in which a person pretends to be someone else and does crime with the name of someone else
Denial of service (DoS) It refers to an attempt to make computer, server or network resources unavailable to its authorized users usually by using temporary interruption or suspension of services.
Ransomware Ransomware is a type of computer malware that encrypts the files, storage media on communication devices like desktops, Laptops, Mobile phones etc., holding data/information as a hostage. The victim is asked to pay the demanded ransom to get his device decrypted.
Botnets A Botnet is a collection of networked computers that reside on the Internet. These computers silently send spam, viruses, and malicious information, to other Internet computers. All based on the instructions they receive from those controlling the botnet.
Whaling A whaling attack is a method used by cybercriminals to masquerade as a senior player at an organization and directly target senior or other important individuals at an organization, with the aim of stealing money or sensitive information or gaining access to their computer systems for criminal purposes.
Spoofing Spoofing, as it pertains to cyber security, is when someone or something pretends to be something else in an attempt to gain our confidence, get access to our systems, steal data, steal money, or spread malware.
Browser hijacking Browser hijacking is the unintended modification of a web browser’s settings by a malware. The term “hijacking” is used as the changes are performed without the user’s permission. Some browser hijacking can be easily reversed, while other instances may be difficult to reverse. Various software packages exist to prevent such modification
Pharming It is a method used by phishers to deceive users into believing that they are communicating with a legitimate Web site. Pharming uses a variety of technical methods to redirect a user to a fraudulent or spoofed Web site when the user types a legitimate Web address
Skimming It is the act of obtaining data from an unknowing end user who is not willingly submitting the sample at that time. An example could be secretly reading data while in close proximity to a user on a bus.
Spamming Unsolicited commercial e-mail (UCE) sent to numerous addresses or newsgroups.
Espionage Espionage is the act or practice of obtaining data and information without the permission and knowledge of the owner.
Computer Virus It is a program written to enter your computer and damage/alter your files/data and replicate themselves.
Worms Worms are malicious programs that make copies of themselves again and again on the local drive, network shares, etc.
Trojan horse A Trojan horse is not a virus. It is a destructive program that looks like a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. Trojans open a backdoor entry to your computer which gives malicious users/programs access to your system, allowing confidential and personal information to be stolen.