Skip to main content
  1. Resources/
  2. Study Materials/
  3. Information & Communication Technology Engineering/
  4. ICT Semester 5/
  5. Cyber Security (4353204)/

11 mins· ·
Milav Dabgar
Author
Milav Dabgar
Experienced lecturer in the electrical and electronic manufacturing industry. Skilled in Embedded Systems, Image Processing, Data Science, MATLAB, Python, STM32. Strong education professional with a Master’s degree in Communication Systems Engineering from L.D. College of Engineering - Ahmedabad.
Types of Attacks and Attackers

Types of Attacks and Attackers

Understanding Threat Actors and Attack Methodologies

Comprehensive Analysis of Cybersecurity Threats and Adversaries

Injection vs Phishing Attacks

Cyber Attack Overview

Cyber Attack: A deliberate exploitation of computer systems, networks, or applications to gain unauthorized access, steal data, disrupt operations, or cause damage to digital assets.

Attack Classification Dimensions:

  • Target Type: Individual, organization, infrastructure, nation-state
  • Attack Vector: Network, web, email, physical, social
  • Methodology: Technical, social engineering, insider threat
  • Motivation: Financial, political, personal, competitive
  • Sophistication: Basic, intermediate, advanced, nation-state level
  • Impact: Data breach, service disruption, financial loss, reputation damage
Threat Landscape: Modern cyber attacks are increasingly sophisticated, persistent, and targeted, requiring comprehensive defense strategies

Classification of Cyber Attackers

Script Kiddies:

  • Skill Level: Low to beginner
  • Methods: Pre-made tools and scripts
  • Motivation: Fame, curiosity, mischief
  • Targets: Opportunistic, random
  • Threat Level: Low to moderate
  • Examples: DDoS using botnets, website defacements

Cybercriminals:

  • Skill Level: Intermediate to advanced
  • Methods: Sophisticated malware, social engineering
  • Motivation: Financial gain
  • Targets: High-value individuals, organizations
  • Threat Level: High
  • Examples: Ransomware, banking trojans, fraud

Hacktivists:

  • Skill Level: Variable
  • Methods: DDoS, data leaks, website defacements
  • Motivation: Political, ideological, social causes
  • Targets: Government, corporations, specific organizations
  • Threat Level: Moderate to high
  • Examples: Anonymous, WikiLeaks operations

Nation-State Actors:

  • Skill Level: Expert/Elite
  • Resources: Government backing, unlimited funding
  • Motivation: Espionage, warfare, political influence
  • Targets: Critical infrastructure, government, military
  • Threat Level: Critical
  • Examples: APT groups, Stuxnet, election interference

Insider Threats:

  • Access Level: Authorized users
  • Types: Malicious, negligent, compromised
  • Motivation: Financial, revenge, coercion
  • Targets: Internal systems and data
  • Threat Level: High
  • Examples: Data theft, sabotage, espionage

Primary Attack Vectors

Network-Based Attacks:

  • Man-in-the-middle (MITM)
  • Packet sniffing and injection
  • ARP spoofing and poisoning
  • DNS hijacking and poisoning
  • Distributed Denial of Service (DDoS)
  • Port scanning and enumeration

Application-Based Attacks:

  • SQL injection and NoSQL injection
  • Cross-site scripting (XSS)
  • Cross-site request forgery (CSRF)
  • Buffer overflow attacks
  • Directory traversal
  • Command injection

Social Engineering Attacks:

  • Phishing and spear phishing
  • Pretexting and baiting
  • Quid pro quo attacks
  • Tailgating and piggybacking
  • Business email compromise (BEC)
  • Voice phishing (vishing)

Physical and Wireless Attacks:

  • Physical Access: Lock picking, badge cloning, USB drops
  • Wireless: WiFi cracking, evil twin, Bluetooth attacks
  • RFID/NFC: Card skimming, replay attacks
  • Infrastructure: Power grid, telecommunications, IoT devices
  • Supply Chain: Hardware trojans, firmware modification

Malware-Based Attacks

Malware: Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems and networks.

Viruses and Worms:

  • Computer Virus: Self-replicating code attached to files
  • Network Worm: Self-propagating across networks
  • Boot Sector Virus: Infects system boot process
  • Macro Virus: Spreads through office documents
  • Polymorphic Virus: Changes code to evade detection

Trojans and RATs:

  • Trojan Horse: Disguised malicious software
  • Remote Access Trojan: Backdoor remote control
  • Banking Trojan: Financial credential theft
  • Infostealer: Sensitive data collection
  • Downloader: Secondary payload delivery

Advanced Malware:

  • Ransomware: Data encryption for ransom
  • Rootkit: Deep system-level hiding
  • Botnet: Coordinated infected machines
  • APT Malware: Persistent, stealthy threats
  • Fileless Malware: Memory-resident attacks
Notable Malware Examples:
WannaCry (2017): Global ransomware outbreak using EternalBlue
Stuxnet (2010): Industrial control system sabotage
Zeus Banking Trojan: Financial credential theft
Conficker Worm: Large-scale botnet formation
NotPetya (2017): Destructive ransomware attack
Emotet: Banking trojan and malware delivery platform

Denial of Service (DoS) Attacks

DoS Attack: An attack that aims to make a system, service, or network unavailable to legitimate users by overwhelming it with traffic or exploiting vulnerabilities.

Traditional DoS:

  • Ping of Death: Oversized ping packets
  • SYN Flood: TCP connection exhaustion
  • UDP Flood: Overwhelming UDP traffic
  • Smurf Attack: ICMP broadcast amplification
  • Teardrop: Fragmented packet exploitation
  • Land Attack: Spoofed source addresses

Distributed DoS (DDoS):

  • Botnet-based: Coordinated zombie machines
  • Amplification: DNS, NTP, SNMP reflection
  • Application Layer: HTTP flood, Slowloris
  • Protocol Attacks: SYN flood, fragmented packets
  • Volumetric: Bandwidth exhaustion attacks
  • IoT Botnets: Mirai, BrickerBot variants

Advanced DoS Techniques:

  • Slowloris: Slow HTTP header attacks
  • R.U.D.Y.: Slow POST attacks
  • HTTP Flood: Legitimate-looking request floods
  • SSL/TLS Exhaustion: Cryptographic resource depletion
  • Application-specific: Database query floods
  • Carpet Bombing: Distributed target attacks

Web Application Attack Types

Web Attacks: Exploitation of vulnerabilities in web applications, services, and related infrastructure to compromise security.

Injection Attacks:

  • SQL Injection: Database query manipulation
  • NoSQL Injection: Non-relational database attacks
  • LDAP Injection: Directory service attacks
  • XPath Injection: XML path manipulation
  • Command Injection: OS command execution
  • Code Injection: Script execution attacks

Cross-Site Attacks:

  • Cross-Site Scripting (XSS): Client-side script injection
  • Stored XSS: Persistent script storage
  • Reflected XSS: Immediate script reflection
  • DOM-based XSS: Client-side DOM manipulation
  • Cross-Site Request Forgery (CSRF): Unauthorized actions
  • Clickjacking: UI redressing attacks

Authentication & Session Attacks:

  • Brute Force: Password guessing attacks
  • Dictionary Attacks: Common password testing
  • Session Hijacking: Session token theft
  • Session Fixation: Predefined session IDs
  • Password Spraying: Multiple account testing
  • Credential Stuffing: Reused password attacks
Web Attack Example - SQL Injection:

Vulnerable Query:
SELECT * FROM users WHERE username = '$user' AND password = '$pass'

Malicious Input:
Username: admin'--
Password: anything

Resulting Query:
SELECT * FROM users WHERE username = 'admin'--' AND password = 'anything'

Result: Authentication bypass due to comment injection

Password and Authentication Attacks

Authentication Attacks: Techniques designed to bypass or compromise authentication mechanisms to gain unauthorized access.

Password Attacks:

  • Brute Force: Systematic password attempts
  • Dictionary Attack: Common password lists
  • Hybrid Attack: Dictionary + character substitution
  • Mask Attack: Pattern-based guessing
  • Rule-based Attack: Password transformation rules
  • Rainbow Tables: Pre-computed hash lookups

Advanced Techniques:

  • Password Spraying: Few passwords, many accounts
  • Credential Stuffing: Reused credential testing
  • Keylogging: Keyboard input capture
  • Shoulder Surfing: Visual password observation
  • Social Engineering: Password disclosure tricks
  • Pass-the-Hash: Hash-based authentication

Multi-Factor Authentication (MFA) Attacks:

  • SIM Swapping: Phone number hijacking for SMS codes
  • MFA Fatigue: Overwhelming users with authentication prompts
  • Token Theft: Physical or digital token compromise
  • Man-in-the-Middle: Intercepting MFA codes
  • Social Engineering: Tricking users to provide MFA codes
  • Bypass Vulnerabilities: Implementation flaws in MFA systems

Wireless Network Attack Types

Wireless Attacks: Exploitation of vulnerabilities in wireless protocols, configurations, and implementations.

WiFi Attacks:

  • WEP Cracking: Weak encryption key recovery
  • WPA/WPA2 Cracking: Handshake capture and cracking
  • WPS Attacks: WiFi Protected Setup vulnerabilities
  • Evil Twin: Rogue access point setup
  • Deauthentication: Forced client disconnections
  • Packet Injection: Malicious wireless traffic

Bluetooth Attacks:

  • Bluejacking: Unsolicited message sending
  • Bluesnarfing: Unauthorized data access
  • Bluebugging: Full device control
  • Car Whisperer: Hands-free device exploitation
  • BLE Attacks: Bluetooth Low Energy vulnerabilities
  • Pairing Attacks: Authentication bypass

Advanced Wireless Attacks:

  • KRACK Attack: WPA2 key reinstallation
  • DragonBlood: WPA3 vulnerabilities
  • RFID/NFC Attacks: Card cloning and replay
  • Cellular Attacks: IMSI catchers, SS7 exploitation
  • IoT Protocol Attacks: Zigbee, Z-Wave vulnerabilities
  • SDR Attacks: Software-defined radio exploitation
Wireless Attack Tools:
Aircrack-ng Suite: WiFi security auditing
Kismet: Wireless network detector
Wifite: Automated wireless attack tool
Reaver: WPS PIN attack tool
Bluez: Bluetooth protocol stack
HackRF/USRP: Software-defined radio platforms
Proxmark3: RFID/NFC research platform

Advanced Persistent Threats (APT)

APT: Sophisticated, multi-stage cyber attacks conducted by well-funded threat actors with specific targets and long-term objectives.

APT Characteristics:

  • Advanced: Sophisticated tools and techniques
  • Persistent: Long-term network presence
  • Targeted: Specific organizations or sectors
  • Stealthy: Evading detection systems
  • Multi-vector: Multiple attack methods
  • Well-funded: Significant resources and time

APT Attack Phases:

  • Initial Reconnaissance: Target research and profiling
  • Initial Compromise: Gaining first foothold
  • Establish Foothold: Installing persistent backdoors
  • Escalate Privileges: Administrative access acquisition
  • Internal Reconnaissance: Network and system mapping
  • Lateral Movement: Spreading across network
  • Maintain Presence: Ensuring persistent access
  • Complete Mission: Data exfiltration or sabotage
Notable APT Groups:

Nation-State Actors:
APT1 (Comment Crew): Chinese PLA Unit 61398
Cozy Bear (APT29): Russian SVR-linked group
Fancy Bear (APT28): Russian GRU-associated
Lazarus Group: North Korean state-sponsored
Equation Group: Sophisticated, likely NSA-linked

Notable APT Campaigns:
Operation Aurora (2009): Google and others targeted
Stuxnet (2010): Iranian nuclear facility sabotage
Operation Red October: Diplomatic and government espionage
SolarWinds Hack (2020): Supply chain compromise

Social Engineering Attack Methods

Social Engineering: Psychological manipulation techniques used to trick people into divulging confidential information or performing security-compromising actions.

Phishing Attacks:

  • Email Phishing: Fraudulent emails
  • Spear Phishing: Targeted attacks
  • Whaling: Targeting high-profile individuals
  • Clone Phishing: Legitimate email replication
  • Pharming: DNS redirection attacks
  • Angler Phishing: Social media exploitation

Voice and SMS Attacks:

  • Vishing: Voice phishing calls
  • Smishing: SMS phishing messages
  • Caller ID Spoofing: Fake caller identification
  • Tech Support Scams: Fake technical assistance
  • IVR Attacks: Interactive voice response exploitation
  • Voice Deepfakes: AI-generated voice impersonation

Physical Social Engineering:

  • Pretexting: False scenarios
  • Baiting: Attractive offers or devices
  • Tailgating: Following authorized personnel
  • Quid Pro Quo: Service exchange offers
  • Impersonation: Authority figure mimicry
  • Dumpster Diving: Information from discarded materials
Business Email Compromise (BEC) Attack Flow:

1. Reconnaissance: Research target organization and executives
2. Email Compromise: Hack executive or vendor email account
3. Monitoring: Observe email patterns and business processes
4. Timing: Wait for opportune moment (travel, deals, etc.)
5. Execution: Send fraudulent wire transfer or payment requests
6. Social Pressure: Create urgency and authority pressure
7. Financial Loss: Successful unauthorized money transfers

Physical Security Attack Methods

Physical Attacks: Direct physical access attempts to bypass digital security controls and gain unauthorized access to systems and facilities.

Lock and Access Attacks:

  • Lock Picking: Mechanical lock manipulation
  • Lock Bumping: Bump key techniques
  • Lock Bypassing: Alternative entry methods
  • Badge Cloning: RFID/proximity card duplication
  • Magnetic Stripe Cloning: Card reader attacks
  • Biometric Spoofing: Fingerprint/facial recognition bypass

Hardware Attacks:

  • USB Attacks: Malicious USB device drops
  • Hardware Keyloggers: Keystroke capture devices
  • Network Implants: Physical network taps
  • Rogue Hardware: Unauthorized device installation
  • Component Substitution: Hardware modification
  • Firmware Attacks: Low-level system compromise

Surveillance and Intelligence:

  • Physical Surveillance: Target observation and profiling
  • Shoulder Surfing: Visual credential collection
  • Camera Placement: Covert monitoring devices
  • Audio Surveillance: Conversation interception
  • Dumpster Diving: Discarded information recovery
  • Social Engineering: Information gathering through deception

Supply Chain Attack Vectors

Supply Chain Attacks: Targeting less secure elements in the supply chain to compromise the primary target through trusted relationships and dependencies.

Software Supply Chain:

  • Third-party Components: Library and dependency compromise
  • Software Updates: Malicious update distribution
  • Development Tools: IDE and compiler compromise
  • Code Repositories: Source code injection
  • Build Systems: CI/CD pipeline compromise
  • Package Managers: Repository poisoning

Hardware Supply Chain:

  • Manufacturing: Factory-level compromises
  • Component Substitution: Malicious hardware insertion
  • Firmware Modification: Pre-installed backdoors
  • Shipping Interception: In-transit modification
  • Vendor Compromise: Supplier network attacks
  • Counterfeit Hardware: Fake component insertion
Major Supply Chain Attack Examples:

SolarWinds (2020):
• Orion software update compromise
• 18,000+ organizations affected
• Government and private sector impact

CCleaner (2017):
• Popular utility software compromise
• 2.27 million users affected
• Targeted secondary payload delivery

NotPetya (2017):
• Ukrainian accounting software MeDoc
• Global ransomware spread
• Billion-dollar damage estimates

ASUS Live Update (2019):
• Hardware vendor software compromise
• Targeted specific machine MAC addresses
• Operation ShadowHammer campaign

Emerging Attack Trends and Techniques

Evolution of Threats: Cyber attacks continuously evolve with new technologies, attack vectors, and sophisticated techniques.

AI and ML Attacks:

  • Deepfakes: AI-generated audio/video impersonation
  • Adversarial ML: Machine learning model poisoning
  • AI-powered Social Engineering: Automated personalized attacks
  • Chatbot Manipulation: AI assistant exploitation
  • Automated Vulnerability Discovery: AI-driven exploit generation

Cloud and Container Attacks:

  • Cloud Misconfigurations: AWS, Azure, GCP security gaps
  • Container Escape: Docker and Kubernetes breakouts
  • Serverless Attacks: Function-as-a-Service exploitation
  • API Attacks: Cloud service interface vulnerabilities
  • Multi-tenancy Attacks: Shared resource exploitation

IoT and Mobile Attacks:

  • IoT Botnets: Device hijacking for DDoS
  • Smart Home Attacks: Connected device exploitation
  • Mobile Banking Trojans: Financial app targeting
  • SIM Swapping: Mobile number hijacking
  • 5G Network Attacks: Next-generation protocol vulnerabilities
Ransomware-as-a-Service (RaaS) Evolution:

Business Model:
• Professional ransomware development groups
• Affiliate partnership programs
• Revenue sharing models (70-90% to affiliates)
• Customer support and negotiation services

Notable RaaS Groups:
Conti: Professional ransomware operation
REvil/Sodinokibi: High-profile attacks
DarkSide: Colonial Pipeline attack
LockBit: Fast encryption and exfiltration

Double/Triple Extortion:
• Data encryption + theft + leak threats
• DDoS attacks during negotiation
• Customer/partner notification threats

Attack Attribution and Threat Intelligence

Attribution: The process of identifying the source, motivation, and methods of cyber attacks through technical and behavioral analysis.

Attribution Indicators:

  • Technical Indicators: Malware signatures, infrastructure
  • Behavioral Patterns: Attack methodologies and timing
  • Linguistic Analysis: Language patterns in code/messages
  • Geolocation: IP addresses and time zones
  • Target Selection: Victim patterns and motivations
  • Tool Reuse: Common attack tools and techniques

Threat Intelligence Sources:

  • Commercial Intelligence: Paid threat feeds
  • Government Sources: National intelligence agencies
  • Open Source: Public research and analysis
  • Industry Sharing: Information sharing organizations
  • Academic Research: University cybersecurity studies
  • Dark Web Monitoring: Criminal marketplace intelligence

Attribution Challenges:

  • False Flags: Deliberate misdirection and deception
  • Proxy Operations: Third-party actors and cutouts
  • Tool Sharing: Common attack tool usage
  • Technical Sophistication: Advanced anti-forensics techniques
  • Time Constraints: Rapid attribution pressure
  • Political Considerations: Diplomatic and economic implications

Defense Strategies Against Attack Types

Attack CategoryPrimary DefensesDetection MethodsResponse Strategies
MalwareAntivirus, EDR, Application controlBehavior analysis, Signature detectionIsolation, Remediation, Recovery
Network AttacksFirewalls, IDS/IPS, SegmentationTraffic monitoring, Anomaly detectionBlock traffic, Incident response
Web AttacksWAF, Secure coding, Input validationLog analysis, Vulnerability scanningPatch applications, Block attacks
Social EngineeringTraining, Email filtering, PoliciesUser reporting, Email analysisUser education, Process updates
DDoSDDoS protection, Rate limiting, CDNTraffic analysis, Performance monitoringTraffic scrubbing, Capacity scaling
PhysicalAccess controls, Surveillance, GuardsPhysical monitoring, Audit logsSecure facilities, Incident investigation
APTLayered defense, Threat intelligenceAdvanced analytics, HuntingComprehensive investigation, Remediation

Key Takeaways

  • Cyber attackers range from script kiddies to sophisticated nation-state actors
  • Attack methods are diverse, covering technical, social, and physical vectors
  • Malware continues to evolve with ransomware and fileless attacks prominent
  • Social engineering remains highly effective against human targets
  • APTs represent the most sophisticated and persistent threat category
  • Supply chain attacks can have massive downstream impact
  • Emerging technologies create new attack surfaces and opportunities
  • Effective defense requires understanding all attack types and threat actors
Remember: Cybersecurity requires comprehensive defense strategies that address the full spectrum of attack types and threat actors in the modern threat landscape

Thank You

Questions & Discussion

Next: Remote Administration Tools