Internet Cyber Threat and Malicious Internet Functioning.

Internet Cyber Threat and Malicious Internet Functioning – DDoS ATTACKS , Ransomware , Virus , Malware and Malicious Activity.

Internet is full of story on Malicious internet activity and web threat that uses the World Wide to facilitate Cybercrime and internet fraud.

There is different types of malware Functioning which use to threats the internet world.

A computer threat is anything that leads to loss or corruption the computer data. Knowledge of internet malware Functioning and threats is the first step in protecting computer system. Cyber Attacks potentially executes through different methods that from malware injection, email phishing, social engineering and internal stealing of data.

In this article, we will describe you to the common computer threats and malware Functioning which lead to disrupting your IT system and computers.

Ransomware

Ransomware is a kind of cyber-attack that involves hackers taking control of a computer system and blocking access to it until a ransom is paid.

Ransomware is a malware functioning in which the data on a victim’s computer is locked. It encrypts your system Data and forces users to pay the ransom through certain online payment methods such as bitcoin to get a decrypt key.

According to internet sources – The WannaCry ransomware attack was a May 2017 worldwide cyber attack by the WannaCry ransomware crypto worm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency.


Malware

Malware is a malicious software or program file that is harmful to system or computers. Malware includes computer viruses, worms, Trojan horses and spyware.

Malware programs can execute a variety of functions, that includes stealing, encrypting or deleting sensitive data, altering or hijacking computer and application functioning. Malware also spying user’s computer activity without user permission.

That malicious intent is often theft of your private information or the creation of a backdoor to your computer, so someone can gain access to it without your permission.


Spam Email

Spam simply refers to a junk e-mail and irrelevant or unsolicited messages sent to large number of users, sometimes millions of people unrequested, promoting products and advertising items.

The purpose of spam email is spreading advertising, phishing, spreading malware, etc. Spam email also contains links that when clicked on could go to a website that installs malicious software onto your computer.


Trojan horse

A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojan is one of the most complicated threats. Unlike computer viruses and worms, Trojans are not able to self-replicate.

It has ability to hide itself from antivirus system detection and steal important information and data like password, banking data, browser cache details and even delete the files.

If the Trojan is a really powerful, it is disrupting the performance of computers or computer networks. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system.


Virus

Virus is a piece of code which can copy itself and aim to corrupting the system or destroying data. Virus is something really popular in the internet world.

Typically, most computer viruses delete computer data, overwrite information, display messages, and add itself to other files on the computer.

Almost all computer viruses only damage the data contained on the computer and do not physically harm the computer or its hardware.


Worms

Computer worms are like viruses. It is a self-replicating computer program and can cause the same type of damage.it can spread from one computer to another computer within a network or even the internet.

Worms typically exploit vulnerabilities in operating systems and spread through e-mail or other file transmission capabilities found on networked computers. The I LOVE YOU, Michelangelo, and MS Blast worms are famous examples.


Spyware

Spyware is a Malware which is designed to spy on the victim’s computer. Spyware is a software that is installed on a computing device without knowledge of the user in order to collect the private information from the system.

Spyware monitor your daily activity in the system so that the attacker can make use of your information.
Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes, passwords, and other valuable data.

Typically, spyware installed when a user download and install free software from the internet. Once the software is installed on user system, the spyware will silently sit and start collecting data from the user’s activities.


Adware

Adware. malware (malicious software) which pop-up unwanted advertisements to the user of a computer. Adware can be designed to collect data on which sites the user visits and send this information back to the company and deliver advertising based on the information.


Backdoor

Backdoor is a malicious code and is a formal method of gaining access to system or an application, which, by exploiting system flaws and vulnerabilities, is used to facilitate remote unauthorized access to a computer system or program.

Using backdoor method attacker often bypass security measures such as firewalls, authentication services and intrusion detection systems. 


Keylogger

Keylogger also known as spyware or monitoring software. It can be used to tracking and recording every keystroke user’s activity on computer. It also keeps a record of every keystroke which user made on keyboard, often without the permission or knowledge of the user.

Most commonly, keystroke logging is malicious spyware that is used to capture sensitive information, like passwords or financial information, which is then sent to third parties for criminal exploitation.


Botnet

Botnet is a collection of compromised and infected computers across the world is often referred to as “zombies”. botnet systems are infected with bot or malware or even Trojan infection, which allows the attackers to control over them.

Bot systems are used to executes malicious activities such as distributed denial-of-service (DDoS) attacks, sending of spam Email, and disturbing internet servers.


Bot

A “Bot” is a type of malware that allows an attacker to take control over an affected computer. Also known as “Web robots”, bots are usually part of a network of infected machines, known as a “botnet”, which is typically made up of victim machines use to perform malicious activities.


Phishing

Phishing is a cybercrime is executed by email, fake website, telephone or text message. This type of attach used to gain financial and personally identifiable information, banking and credit card details, and passwords.

Phishing is an email trap where users easily trapped in fake financial activities and end up with lost money.

Don’t open spam email and reply any unidentified email which leads stealing the identity and financial lose.


Cookies

Cookies is not really a Malware. It is small piece of information or file used by most websites to store into your end user computer.

The problem is that those same cookies can also be used to track people, and execute things that many people don’t like, such as deliver targeted ads.


SQL Injection

SQL Injection is a database attack where attacker gain unauthorized access of Database execute malicious SQL statements. SQL injection does not infect the end users directly.

Since an SQL Injection vulnerability could possibly affect any website or web application that makes use of an SQL-based database.


Brute force Attack

Brute-force attack attempt by hackers which determined to crack system or application password to gain the system access. In the Brute-force attack hackers run multiple algorithm with help of software to generate large numbers consecutive possible combinations to guess the password.

This Brute-force practices sometime successfully cracking the login password of a system. Because many users keep short and easy password which only contain of characters of the alphabet and numbers, which helps hackers to makes it easier to guess the password.


DDoS

DDoS attacks are one of the most common cyber-attack by Anonymous (hackers) by flooding it with unwanted huge traffic from multiple computers by Botnet.

The purpose of DDoS attacks to target a system (like online web-service) to make the disrupting internet services and network resources.so that legitimate users cannot gain online servers access.
 

TYPES OF DDoS ATTACKS

  • Volumetric Attacks

Volumetric attacks attempt to eat up the internet bandwidth of the network between the target system and the Internet. These attacks are simply about causing congestion and make the online service unavailable for end users.

  • TCP SYN FLOOD ATTACK

SYN FLOOD ATTACK attempt to consume the connection state tables of Firewalls, load-balancers and servers. Even high computing devices can maintain state on millions of connections can be disrupted by these attacks. This is also known as CP State-Exhaustion attacks.

  • Application Layer Attacks

Application Layer attacks target is a form of DDoS attack where attackers target the application layer of the OSI model. The existence of attack is specific functions or features of a website with the intention to disable those functions or features.

They target applications in a way that they appear to be legitimate requests from users. Since they can be smaller than traditional volumetric DDoS attacks they may go unnoticed by security solutions until it is too late.

Author: Ronnie Singh

Leave a Reply