SamSam Ransomware: made $850K by attacking government organizations
SamSam Ransomware uses a custom infection in targeted attacks and the ransomware have been made by SamSam group. The ransomware has been publically available since 2015 and has been known for targeting government entities in USA. The ransomware is developed privately and modernized regularly
Jigsaw Ransomware: Pay $150 in bitcoin with live support or get files deleted
Jigsaw Ransomware (BitcoinBlackmailer) targets Microsoft Windows first appeared in 2016. The ransomware is desgined to spread through malicious attachments in spam emails. It not only encrypts the user's files but also deletes them if the user takes too long to make the ransom payment of $150
Heap Spraying Attack
Heap Spraying Attack is a type of cyber attack in which the attacker uses the ability to write the series of bytes in the memory for the running program at various places in the heap. The main aim of the attack is to ensure that the bytes can be accessed later as the vector of the separate attack.
Password Spraying Attack
Password Spraying is a form of cyber attack similar to a brute force attack, where the hacker tries to gain access to the company system by testing out a small number of commonly used passwords on a large number of accounts. This attack allows a attacker to gain access to multiple accounts
BlueBump attack is an cyber attack for bluetooth enabled devices. The attack allows the attacker to connect to the Bluetooth device of target, and then exploit the link key of the target device. The attack gives the attacker unlimited access to the victim's device which is in a very limited range
OS Command Injection Attack
OS Command Injection is a form of shell injection attack, mostly used for execution of unauthorized OS commands in the operating system (OS) to target the system (usually a web server) and degrade its performance. In this attack, the hacker aims to find and exploit some of the vulnerable application
Malvertising is a type of cyber attack in which an hacker use the online advertising to spread the malware. The attack can infect a system pre-click or post-click. A pre-click malvertisement can be embedded in the main scripts of the page. It can even initiate drive-by-download on visiting the site
Fork Bomb Attack
Fork Bomb Attack is a type of denial of service attack which causes the degradation of a system by making it run out of the memory. The attack forks the processes recursively to fill the entire available memory, thus choking system resources. Locating and terminating a Fork Bomb is a tedious process
DNS Amplification Attack
DNS (Domain Name System) Amplification is a form of reflection based DDoS attack, in which a hacker spoofs the look-up requests to spoof the DNS servers to hide the source of an exploit and also to direct the response to the target. The attack exploits the disparity in the bandwidth consumption
IP Spoofing Attack
IP (Internet Protocol) Spoofing is a form of cyber attack in which hacker crafts the IP packets which are used to carry out the DDoS attacks as well as MitM attack. In this attack, the fake crafted IP packets are used to impersonate another system or is used to hide the identity of the hacker.
MAC Flooding Attack
MAC (Media Access Control) Flooding is a type of cyber attack done in a network to compromise the security of the network switches. In this attack the network is flooded with the fake MAC addresses. The hacker uses this attack to steal sensitive data that is being transferred in the network.
Smurf Attack is a type of DDoS Attack, which floods the system with the spoofed ping messages. The attack has an amplification vector that increases the damage by exploiting the characteristics of the broadcast network. The attack swamps the internet with the replies to ICMP echo requests.
Bluebugging is a type of cyber attack done on the Bluetooth enabled devices. The attack allows the hacker to access the cell commands and infiltrate the phone calls, read and send SMS. This allows any hacker to modify the contact list, connect to the internet and eavesdrop on any phone conversation