The Art of Cyber Attack Infiltration. Unveiling Common Methods and How to Stay Vigilant.

Myra Jarenga
OSINT for all
Published in
6 min readJul 22, 2023

Introduction

In today’s digital age, the internet has become an integral part of our daily lives. As we rely more on online activities, cyber attackers have also evolved their techniques to infiltrate our systems and exploit vulnerabilities. Understanding the methods, they use is essential to staying vigilant and safeguarding ourselves against potential cyber threats.

Let's find out some of the most common methods of cyber-attack infiltration and provide real-world examples to help you comprehend the risks better.

  1. Phishing Attacks

Phishing is one of the most common methods cybercriminals use to deceive individuals into revealing sensitive information, such as login credentials or credit card details. Attackers typically send fraudulent emails or messages that appear to be from reputable sources, luring victims to click on malicious links or download malicious attachments.

Example.

An attacker might send you an email posing as a bank representative, requesting that you verify your account information by clicking on a link. This link would direct you the victim to a fake website that mimics the bank’s login page, tricking you into entering your credentials, which the attacker then captures.

How to stay vigilant. Always double-check the sender’s email address and scrutinize any unexpected requests for personal information. Avoid clicking on links or downloading attachments from unfamiliar sources.

2. Malware Attacks

Malware refers to malicious software designed to infiltrate systems, steal information, or cause harm to a user’s computer or network. Common types of malware include viruses, worms, Trojans, and ransomware. If you have no idea about these I have an article on the same here Analyzing a Cyber Attack which will help you understand these better.

Example

You might unknowingly download a seemingly harmless software or open an infected email attachment, triggering the installation of malware on their device. The malware could then encrypt your files, rendering them inaccessible until you pay a ransom. Thes is mainly done by black hat hackers.

How to stay vigilant. Keep your operating system, antivirus, and other software up to date. Avoid downloading software from untrusted sources, and be cautious with email attachments, even from seemingly legitimate sources.

3. Man-in-the-Middle (MITM) Attacks.

In MITM attacks, cybercriminals intercept and potentially alter communications between two parties who believe they are directly communicating with each other. The attacker positions themselves between the sender and the receiver, enabling them to eavesdrop or modify data.

Example.

In a public Wi-Fi setting, an attacker could set up a rogue access point with a name similar to a legitimate one. Unsuspecting this you might connect to the fake network, allowing the attacker to intercept your data.

How to stay vigilant. Avoid using public Wi-Fi networks for sensitive activities, such as online banking or accessing confidential information. Always ensure you are connected to legitimate networks and use encryption tools like VPNs for added security.

4. Social Engineering Attacks.

Social engineering involves manipulating individuals into divulging sensitive information or performing certain actions through psychological manipulation and deception.

Example.

An attacker might impersonate a trusted colleague or technical support agent to gain the victim’s trust. They could then request you sensitive information or ask you to perform actions that compromise your security or security of the organization you work for.

How to stay vigilant. Be cautious about sharing sensitive information with unknown individuals, even if they seem familiar. Verify the identity of anyone making requests, especially if they involve sensitive data or financial transactions.

5. SEO Poisoning.

SEO (Search Engine Optimization) poisoning, also known as search engine poisoning or black hat SEO, is a technique used by attackers to manipulate search engine rankings by inserting malicious content into legitimate search results. The goal is to lure unsuspecting users like you to malicious websites, where they may be exposed to malware, phishing attempts, or other harmful activities.

Example.

An attacker might use SEO poisoning to elevate their malicious website’s ranking for popular search terms (e.g., “free software,” “discounted products”). So, when you search for these terms, they might unknowingly click on the malicious link, leading you to a website designed to infect your devices or steal your personal information.

How to stay vigilant. Be cautious when clicking on search results, especially if they seem unrelated or suspicious. Stick to well-known and trusted websites whenever possible.

6. Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks

DoS and DDoS attacks aim to disrupt the availability of a website or online service by overwhelming it with an excessive amount of traffic, rendering it inaccessible to legitimate you.

Example.

In a DoS attack, a single attacker might flood a website with an enormous number of requests, causing the server to become overwhelmed and crash. DDoS attacks, on the other hand, use multiple compromised devices (a botnet) to coordinate a massive attack, making it even harder to mitigate.

How to stay vigilant. If you are a website owner, you should implement DDoS protection service, and configure firewalls to filter out malicious traffic. Read more on firewalls here Firewalls. Regularly monitor network traffic to detect any unusual patterns.

7. Wi-Fi Password Cracking

Wi-Fi password cracking involves attempting to gain unauthorized access to a wireless network by decrypting or bypassing its security protocols.

Example

Using specialized software and hardware, an attacker may attempt to crack the Wi-Fi password of a target network. Once successful, they can connect to the network and potentially launch further attacks against connected devices. Like MITM attack we’ve just seen above.

How to stay vigilant. Use strong and unique Wi-Fi passwords, enable WPA2 or WPA3 encryption, and regularly update your router’s firmware to patch known vulnerabilities.

8. Password Cracking Attacks

Password cracking attacks involve an attacker attempting to gain unauthorized access to your accounts by systematically guessing or breaking the passwords.

Example.

An attacker might use brute-force attacks, dictionary attacks, or more advanced techniques like rainbow tables to crack weak or common passwords.

How to stay vigilant. Use strong and unique passwords for each of your online accounts. Stop using passwords like your birthday's date or members of your family birthday dates your name or pet's names etc. Use password with more than ten characters incorporating special characters numbers and letters. Now days many websites you sign up to you will get them asking you to use strong password on singing up, and you are not allowed to sign up until you do. which is a good practice. Enable multi-factor authentication (MFA) whenever possible to add an extra layer of security.

There are more of these methods of infiltration by cyber-attacks that I have not talked about and by continuous learning we get to learn more.

In conclusion.

As cyber threats continue to evolve, understanding the various methods of cyber-attacks is vital for staying vigilant and safeguarding your online activities. By being aware of these attacks, you can better protect yourself and your digital assets from potential harm. Implementing best security practices that I talk about here Security Best Practices for an Organization and keeping your software up to date will significantly reduce the risk of falling victim to these attacks.

NB. Proactive measures are key to maintaining your online presence safely.

I hope you enjoyed reading this as much as I enjoyed writing it. I learned all these on Cisco Skills for all Platform. More so I hope you’ve learned how attackers use these methods to get to you and how you can stay safe online. If you would like to learn more, you can do so by sending me a DM on Twitter @myrajarenga. You can also connect with me on LinkedIn Myra Jarenga. You can also support me by following me on this blog. Thank You

--

--

Myra Jarenga
OSINT for all

A Cybersecurity analyst with customer service experience and AI expert.