Follow Us

Types of Cyber Attacks and their effects

Most Popular Cybersecurity Attacks


Peoples who use or create a computer system to gain access to information illegally or to cause densy of service to the information system are called attackers.
the attackers exploit the holes or vulnerabilities in the computer or the system to attack it there are two forms of attacks :
  1. Direct attack: Direct attack is when the attacker uses his computer to attack the other systems.
  2. Indirect attack: Indirect attack is when the attackers compromised the other systems and used them in a distributed denial of service attack (DDoSA)
Types of Attacks

Types of attack can be classified according to their requirement Following are some of the important attacks that can be used against control systems

Malicious code: malicious code or logic or malware is a new kind of threat where hardware software or firmware are intentionally included in a system for an unauthorized purpose. It is a threat to a computer which includes virus worms trojan horses etc.
Other forms of malware are
  1. Bot: A bot is an automatic software system program, will execute a particular command once It receives a particular input.

  • Spyware: Spyware is the program that covertly installs themselves through some back-door mechanism, including trojan horses and spy on a users private confidential data.
  • Adware: Adware is a general term for software that use typical malware techniques to obtain marketing data or advertise a product or services. The adware program collects information for advertising and market research purpose by using the attractive software that offers a user as free of cost or less price.

  • Hoaxes: A hoax is an act which makes the user believe that something false is real. It provides a false warning with different sources e-mail, attached with software etc., and transmit the virus into the computer system. These may attack the whole message and disturb the user to perform easily. 

    Back-Door: A back-door is a mean of access to computer programmer that bypass the security mechanism. A user something! install a back-door S0 that program should be access or troubleshooting requirement- An attacker use back-door to detect and install themselves as a part of a process to exploit

    Password Crack: secret crack is that the method of the sick word from information that has been keep or transmitted by a computing system. Through the protection, Account Manager (SAM) record may be obtained by the hackers that represent the user’s passwords. These are also hashed by a similar algorithmic rule and compared it with a hashed result. If it's matched, then a Pass-word is cracked.


    Brute force may be a specific act or arrange wont to break your fondly created secret. A Pass-word attack that doesn't arrange to rewrite any data, however, continues to undertake. As an example, a brute-force attack could HA a wordbook of all words or a list of normally used passwords. to achieve access to The account used by the brute-force attack, a program tries all accessible words it's to achieve access to the account. Another kind of brute-force attack may be a program that runs through all letters or letters and numbers till it gets a match. Although a brute-force attack is also able to gain access to the account eventually these attacks will take many hours, days, months and even years to run. the number of your time it takes to complete these attacks depends on however difficult the Password Is and the way well the Hacker Know the target. To help stop brute-force attacks several systems solely enable a user to create an error In coming into their username or Password 3 or fourfold. If the user exceeds these tries, the system can either lock them out of the system or stop any future makes an attempt for a group quantity of your time.

    Denial-of-Services (DoS) and Distributed Denial-of-Services (DD0S) 

    Denial-of-Services (DoS): The denial-of-service attack prevents the traditional use of your pc or network by valid users. when gaining access to your network, the hackers will do any of the following:
    1. Randomize the eye of your internal data systems employees so they are doing not see the intrusion instantly, that permits the hackers to create a lot of attacks throughout the diversion.
    2. Send invalid information to applications or network services, that causes abnormal termination or behavior of the applications or services.
    3. Flood a pc or the whole network with traffic till an ending happens because of the overload.
    4. Block traffic, which ends during a loss of access to network resources by licensed users. 
    Distributed Denial Df-Services Attack (DD0S)

    DDoS is one among the new emerges connected it COflSISt of lai ing a denial-of-service attack from a decent range of websites against one host These types of attack usually more practical to form the large company sites than DoS attack. Any DD0S attack involves 3 styles of activities,
    1. Master: The master brings attackers.
    2. Slaves: It brings the compromised system.
    3. Victim: it's most respected i.e., the victims UN agency get attacked. The assaulter sends the precise command to the Slaves or Zonthie system than the launch of attack turns up.

    Spoofing additionally called masquerading, it's associate Act dissimulation to be one thing or some other person.
    Example: the hacker will impersonate the web Protocol (IP) address of a user to induce into the account. the associate hacker might send fallacious e-mail and set a Bogus website so as to capture the user id, password, and account data.


    This attack happens once somebody between YOU and therefore the person with whom you's act is actively observation, capturing and dominant your communication transparently.
    Example: The hacker will re-route an information exchange. once computers square measure at low levels of the network layer, the computers won't be ready to confirm with whom they're exchanging knowledge.
    Man-in-the-middle attacks somebody forward your identity so as to browse your message. The pron on the opposite finish may well believe it's you as a result of the attack may be actively replying as you to stay the exchange going associated gain a lot of informat1or This attack is capable of constant harm as an application-layer attack.


    Spam Is the term describing unwanted e-mails, newspapers or discussion forum message. It looks like an Unharm act, by advertising from a famous vendor and sends the unrequested message with a virus or trojan horses attached. 

    Mail Bombing: 

     The bomb is a piece of bad code deliberately planted by an insider or supplier of a Programme. A bomb gets triggered by an event which Is logical or Time-based. The bombs explode when the conditions of explosion get fulfilled causing the damage immediately. However, these programs cannot infect other programmes.
    Since they do not propagate by Infecting other programmes, chances of a widespread epidemic are relatively slim. Bombs are generally of ie following two types,
    1. Time Bomb: This name has been borrowed from its physical counterpart because of the mechanism of activation. A physical time bomb explodes at the time It Is set for (unless somebody forces it to explode early), so is the computer time bomb which causes the perverse activity, such as, disruption of computer system, modifications or destruction of stored informatioritC., on a particular ‘e and time for which it has been developed. It is initiated by the computer clock.
    2. Logic Bomb: This perverse software may be similar in perverse activity time bombs Logic bombs are the Activity to time bombs. Logic bombs are activated by certain combinations of events. Example: A code like, “if MYFILE is deleted then destroy the memory contents by writing zeros.” This code segment, on execution, may cause a destruction of the contents of the memory on deleting a file named MYFILE. These bombs can be set to go off at a future time or event.


    This attack is the application or device that may scan, monitor and capture network information exchanges and browse network packets. If the packets don't seem to be encrypted, this attack provides a full read 0f the information inside the packet. Even encapsulated (tunneled) packets will be broken open and browse unless they're encrypted and also the hacker doesn't have access to the key.
    Using this attack, the hacker will do any of the subsequent Analyze the network and gain data to eventually cause the network to crash or to become corrupted. browse the communications.


     Phishing is the method where fake website are being set or e-mail message is sent the look like legitimate businesses to ask the user to confidential personal data.
    The basic aim of phishing is to gain personal and financial information of a person by posing a legitimate entry. 

    In this attack, redirect users to a bogus webpage even when individuals types correct webpage address into his/her browser. The main objective of this act is to gather the private and confidential information.

    Timing attack: 
    InterServer Web Hosting and VPS
     Kocher was the first to discuss the timing attack when he was an undergraduate student in is a form of side channel attack where an attacker gathers information by implementing cryptosystem. Through this act, they gain the key .and encryption algorithm and can also gain the secret information.

    Recent Posts