top of page

Most Common Types of Cyber Attacks

Hello everyone,

I am Nitin yadav(KD) back again with another write-up

Cybercriminals have caught the attention of those who now live in fear. The more serious threat to every person is cybercrime, including people who use the internet. Internet users are advised to change their passwords periodically to avoid hacking activities from taking place. Hacking users' accounts will further lead to stealing money from them.


Whether you're a big company or own a small business, the threat of cyber attacks can be daunting. Cyber attacks are expensive and time-consuming. An extensive study found that just one breach could cost companies up to six million dollars and two hundred thousand hours in repair costs. This means it's crucial to have systems in place that protect you from cyber-attacks and data breaches.

There are many different types of cyber attacks, but some are more common than others. Here are some of the attack vectors.


  • Phishing Emails

  • Phishing is a type of cyber attack that involves tricking someone into giving away their personal information, such as their login credentials or credit card number. Attackers do this by sending fake emails or messages that appear to be from a legitimate source, such as a company or website. Emails designed to look like they came from a legitimate bank, government agency, or organization but are from cybercriminals are called phishing emails. In these emails, the sender asks recipients to click on a link that takes them to a page where they will confirm personal data, account information, etc. How to detect a Phishing email They will request your sensitive information via email which the real companies can't ask for. Real and legit companies call you by your name but in these phishing emails they will use something like this: "Dear User", "Dear Valued Member", "Dear Customer" or "Dear Account Holder" Real companies have domain emails ( I don't but I am real 😅) Real companies know how to spell Real ones don't force you to their website Real ones don't send attachments they will direct you to their site to download it from there

  • Spoofing

  • When someone or something pretends to be something else in an attempt to gain our confidence, get access to our systems, steal data, steal money, or spread malware. This could contain email spoofing, website spoofing, caller id spoofing, GPS spoofing, IP spoofing, MITM, and Facial spoofing Spoofing can be done by following methods Email spoofing Website and/or URL spoofing Caller ID spoofing Text message spoofing GPS spoofing Man-in-the-middle attacks Extension spoofing IP spoofing Facial spoofing Protection against Spoofing Turn on your spam filter Don't click on links or open attachments in emails Log in through a separate tab or window Show file extensions in Windows (as it does not show file extensions by default) Invest in a good antivirus program

  • Social Engineering

  • Social engineering is the art of manipulating people so they give up confidential information. It's a lot like conning, but instead of money, the victim gives up some sort of confidential information like passwords, social security numbers, and bank account numbers. This ends up benefitting the attacker more than the person on the receiving end. Social engineers will trick their victims into doing something they don't want to do like opening a malicious file, downloading software, or even calling a certain phone number. For example, getting a customer service representative to reset a password or give out information that you could use against them in an attack on their company. Threat actors will employ social engineering in conjunction with other tactics in order to achieve their goals. Instead of just using brute force to find passwords or sensitive information, they'll use social engineering tricks and influence, as well as sift through emails or private messages to get what they're looking for. Hackers will do just about anything to be successful. They will act as humans, not bots, and ask questions designed to elicit the truth. Tips for not being a victim Slow down (hackers want you to act fast) Research if you think something is suspecious Don’t let a link be in control of where you land Beware of any download Foreign offers are fake (a lottery from a foreign country) Protection against social engineering Delete any request for financial information or passwords Reject requests for help or offers of help Set your spam filters to high Secure your computing devices (install antivirus, firewall and email filters)

I hope you enjoyed this one and I see you next time :)


Take care and stay safe!

349 views0 comments
bottom of page