Cyber attack

A cyber attack is an attack on a computing system, environment, or infrastructure that occurs in cyberspace with the intent of maliciously disrupting, denying, disabling, degrading, destroying, or controlling information system resources or the information itself.

In 2021, 86.2% of organizations were affected by at least one successful cyber attack, up from 80.7% in 2020. This marks the single greatest increase in cybercrime since 2014, and is attributed to trends accelerated by the global pandemic of 2020 that are expected to continue.

Types of cyber attacks and examples

Untargeted attacks target as large a number of devices, services, and users as possible and do not discriminate between targets. Examples include phishing, water holing, ransomware, and scanning. Targeted attacks are tailored to specific organizations and require laying the groundwork to develop and execute the attack, and include spear phishing and distributed denial of service (DDoS) attacks.

Stay on top of best practices to prevent against ransomware attacks at eSecurityPlanet.com.

Active attacks, such as spoofing or man-in-the-browser, attempt to affect the operations of system resources. Passive attacks like wiretapping or port scanning attempt to learn or exploit information from the system without affecting system resources or being detected.

Syntactic attacks are malicious software (malware) that infects computer systems and include viruses, worms, and Trojan horses. Semantic attacks involve modifying information or disseminating incorrect information.

Attacks also have different modalities. The above attacks can be used for a supply chain attack, social engineering that seeks to psychologically manipulate individuals, or exploits intended to damage, control, or gather information from a computer system.

How does a cyber attack work?

Cyber attacks can be broken down into a few main stages. These stages may be repeated by cyber attackers for as long as they go undetected or encountered.

  1. In the survey stage, attackers seek vulnerabilities through investigating and analyzing any available information about the target. This can be done through open-source information, standard scanning tools, or cyber attacks that access controlled systems or that exploit targets through social engineering, such as through social media or email.
  2. In the delivery stage, the cyberweapon is delivered to the point in cyberspace where the vulnerability can be exploited. This can be achieved electronically through information systems such as an email link or attachment, but may also involve other elements, such as giving someone an infected USB stick or directing them to a fraudulent website.
  3. In the breach stage, vulnerabilities are exploited to gain unauthorized access to information resources. The attack may make changes to a system, gain access to controlled information, or attain control of a user’s account or devices.
  4. In the affect stage, activities are carried out to achieve the attacker’s ultimate goals. This stage could be used to damage an organization or gain benefits such as bank account transfers or the theft of intellectual property. It can also be used to deepen control of the system or to gather information needed to set the stage for a new attack. Here, attackers may explore the system, expand access, or consolidate an ongoing presence – or they may remove evidence of their access and exit the system, and possibly leave access routes for future attacks by themselves or others. Other attackers may try to make their attack obvious in order to make a public statement or gain notoriety.

What are the purposes of cyber attacks?

Cyber attacks can have a variety of motives, but common themes are:

  • Financial gain
  • Disruption of operations or behavior
  • Making a statement
  • Inducing fear
  • Raising awareness about vulnerabilities
  • Pranking
  • Warfare between nation-states
  • Terrorism by non-state actors

Who commits cyber attacks?

Individuals who commit cyber attacks are known as cybercriminals or hackers, and tend to be motivated by financial gain. Larger, more sophisticated attacks can be committed by organized criminal syndicates or gangs of cyber attackers, terrorists, or so-called hacktivists seeking to make a statement or disrupt operations. Nation-states are also known for cyber exploitation and espionage, either directly or through state-backed hackers.

All of these are considered bad actors or threat actors, and can act on their own behalf or be commissioned by others. Cyber attacks can be perpetrated from outside an organization or from within.

Who and what are the targets of cyber attacks?

Anyone and anything can be the target of cyber attacks. Individuals, enterprises, and governments tend to be targeted for their financial, intellectual, and data assets, or to make a political statement. Meanwhile, critical infrastructures such as control systems, energy, finance, telecommunications, transportation, water, and hospitals may be targeted in instances of warfare and terrorism.

Lucas Ledbetter
Lucas Ledbetter writes about technology in marketing, education, and healthcare and provides content strategy consultation for small businesses. In his spare time, he studies languages, dabbles in poetry, and tinkers with his Raspberry Pi. Follow him at thinkbettermarketing.com.

Top Articles

The Complete List of 1500+ Common Text Abbreviations & Acronyms

From A3 to ZZZ we list 1,559 SMS, online chat, and text abbreviations to help you translate and understand today's texting lingo. Includes Top...

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

Generations of Computers (1st to 5th)

Reviewed by Web Webster Learn about each of the 5 generations of computers and major technology developments that have led to the computing devices that...

Eventbrite

  Eventbrite is an online event posting, event management, and ticketing website. Eventbrite can...

Docker

Docker is an open-source platform used for developing and running applications by allowing...

Blockchain

Blockchain is one of the core technologies behind cryptocurrency. Blockchain is a system...