To adequately prepare, you need to understand the various types of cyberattacks threatening internet safety. Many attackers have the intention of stealing sensitive data and using it for monetary gain, as the vast majority — nearly 96% — of data breaches since 2015 have been financially motivated, according to the 2022 Data Breach Investigations Report. Attackers sell this information to other cybercriminals, who may then use it for fraudulent transactions, identity theft, extortion or other unethical purposes. In addition, “hacktivism” or espionage leaks are the second most common motive for cybercriminals, which accounts for 25% of cybercrimes since 2015.
For either motive, stolen information is the main focus and there are several ways to go about obtaining that information. This guide walks you through some of the most common cybersecurity threats.
Phishing, smishing y spear phishing
Phishing is a common form of spam intended to create a sense of urgency or incite fear in the recipient of an email, phone call or text message. The scammer wants the recipient to feel compelled to hand over sensitive information, such as login credentials or bank account numbers. This is done through intimidation tactics, such as alerting the consumer that they have broken some sort of policy and need to update their account immediately.
The message sent is always intentionally deceptive, sometimes even impersonating popular brands — or even simply area codes — that customers typically trust. This identity masking is called spoofing. If the sender is clearly pretending to be a trusted company, they are likely targeting customers of that specific company. There is usually a link within the email or text that leads you to a fake website of said company. This is called spear phishing.
Phishing efforts specifically done via spam texts are known as smishing. These messages are sent via Short Message Service (SMS), but they have the same basic makeup as phishing emails and phone calls. The scammers attempt to obtain sensitive information from you by pretending to be a legitimate company with an offer or “urgent” matter that needs your attention. If there is some sort of social engineering involved, scammers will use pretexting to communicate a bit and try to deceive you.
Todas estas estafas de phishing tienen algunas funciones que ayudan a que sean más fáciles de detectar. No hagas clic en un enlace ni divulgues información sensible si notas:
- Números de teléfono o URL que parezcan falsos
- Errores de ortografía y gramaticales
- “Premios” no solicitados
- Urgencia inusual
Si algo parece estar mal, es mejor prevenir que lamentar. Por lo general, las empresas legítimas no requieren una acción inmediata ni piden que envíes información confidencial a través de canales digitales inseguros.
Malware
Malware is a type of software designed to harm your computer, thwart your ability to access your tech or gain access to your information. The prefix “mal” refers to “malicious” software, encompassing all types of computer viruses, bugs and software downloaded without your express permission or knowledge.
Algunas de las formas más comunes de malware incluyen:
- Cryptojacking — Newer malware that allows hackers to mine cryptocurrency without the owner’s knowledge
- Ransomware — Malware that effectively holds your system for ransom, disabling it until you pay a sum of money
- Spyware — Malware that spies on your device’s activity without your knowledge
- Trojans — Malware that is enacted unknowingly by victims when downloaded and used under false pretenses due to social engineering in emails or texts
- Viruses — Forms of malware that attaches to a file on your device and then expands to other files to delete, corrupt or encrypt them
- Worms — Similar to viruses, worms are invasive but work to find places to exploit your system instead of attacking files
Independientemente del tipo de ataque malicioso, el malware necesita explotar alguna vulnerabilidad en tu sistema. Esto permite a los hackers acceder a tu dispositivo o servidor sin tu permiso, causando estragos de diversas maneras.
Denegación de servicio distribuido (DDoS)
Distributed denial of service (DDoS) attacks inundate their target server, network, or website with a deluge of fake traffic, so it’s inaccessible to real users. The botnet — a network of devices used for a DDoS attack, including computers and IoT devices — may release several issues as a part of the attack, all to crash the web server. This may be done through overwhelming bot traffic or other scripts that flood the server with too many or conflicting requests. This increases your vulnerability and may be used to:
- Extorsiona dinero del objetivo
- Haz una declaración política o socioeconómica
- Impide que otras empresas participen en un evento de ventas
- Sirve como una cortina de humo
With the smokescreen tactic, your systems will all be focused on getting the server back online. This distracts from possible exploitations that allow for other forms of cyberattacks. Regardless of the intent, DDoS attacks are a nuisance and can cost you or your business unnecessary time, resources and money. However, they can be easily addressed with a cloud-based mitigation service.
Conversely, a Telephony denial of service (TDoS) attack attempts to distract a phone service and prevent incoming and outgoing calls by overwhelming them with fake/scam calls. Luckily, this can be easily addressed with a layered approach to your voice security.
Intermediario (MitM)
Los ataques MitM también se conocen a veces como “ataques de monstruo-en-el-medio, máquina-en-el-medio, mono-en-el-medio, entrometido-en-el-medio o persona-en-el-medio”. Todos estos significan lo mismo: que un atacante cibernético está interceptando tus comunicaciones. Por lo general, esto ocurre cuando un intruso intenta obtener información sensible. A veces, también pueden modificar los mensajes entre dos partes.
Amenazas persistentes avanzadas (APT)
Si un grupo organizado está particularmente interesado en hackear tu empresa, pueden usar APT. Las APT no son ataques de una sola vez; son esfuerzos continuos para comprometer tus sistemas a lo largo del tiempo. Los intrusos que tienen metas a largo plazo en mente suelen llevar a cabo estos ataques, empleando diversas técnicas para explotar tus sistemas.
Las APT pueden llevar a lo siguiente:
Independientemente del objetivo, las APT son especialmente insidiosas. Los intrusos pueden causar efectos duraderos y perjudiciales para ti o tu organización.