focus notes


What is a cyber attack? Explaining the types and examples

table of contents
"Cyber attacks" are something we often hear about in the news these days. Their types and contents change over time. As the information society progresses, life becomes more convenient, but at the same time the risk of cyberattacks increases. So this time, Explaining what types of cyber attacks there are, along with examples that have occurred in the past.To do.
Types of cyber attacks
There are different types of cyberattacks, and their backgrounds vary widely. Learn the background behind cyberattacks and deepen your understanding of them by putting yourself in the position of the attacker.
In this article, we will classify cyber attacks from the following three perspectives.
- Attacker image
- Attack method
- How to spread
Before that, let's first take a look at what the purpose of a cyber attack is.
What is the purpose of a cyber attack?
If you think about it from the perspective of someone who launches a cyber attack, there is always a purpose behind the attack. By understanding the attacker's objectives, you will know what you need to protect, and it will be easier to take security measures.
Mischief and self-exhibitionism
Many of the activities of people traditionally called hackers were crimes for fun. For them, cyberattacks were carried out to demonstrate their technological prowess to the world. For this purpose, There are many types of cyber attacks that are noticeable, making it easy to notice that you have been attacked.For example, the following cyber-attacks may also be carried out for this purpose.
- Website tampering
- joke virus
- browser crusher
financial purpose
In recent years, the activity of hackers aiming to obtain money has increased. Nowadays, due to the information society, The value of IT as a whole is increasing, and the reward amount for a successful attack is increasing.Therefore, there are many criminal groups that make a living from cyber attacks. For example, the following cyber-attacks may also be carried out for this purpose.
- Phishing
- Ransomware
- mining malware
Service interference and harassment
This is a cyber attack aimed at damaging a rival company or harassing someone with whom you have a grudge. For example, the following cyber-attacks may also be carried out for this purpose.
- DDoS attack
- SNS account spoofing
espionage and political activities
Cyber attacks are widely used in intelligence activities. Recently, election-related cyber attacks have also occurred and attracted attention. For example, the following cyber-attacks may also be carried out for this purpose.
- fake news
- Exploitation and leak of politically incorrect information
- SS7 call eavesdropping
Types of cyber attacks by attacker profile
In the previous chapter, we explained the purpose of cyber attacks. In the chapters that follow, we will look at each classification.
Attackers in cyberattacks can be broadly classified as follows. The attack methods and objectives vary greatly depending on the position of the person planning the cyber attack.
◆Individual
Attacks launched by individuals are often motivated by mischief or grudges.
◆Criminal organization
Attacks launched by criminal organizations are businesses, so their purpose is often to obtain money. Most targets are private companies or individuals.
◆Nation
Attacks launched by states often have strong political implications, as the target is often at the national level. Furthermore, countries at war are constantly engaged in intense cyber warfare.
Types of cyber attacks by attack method
Next, let's take a look at the types of cyber attacks by attack method.
◆Sabotage activities
Since data loss is often the goal, you can prevent this by backing up your data. In some cases, the purpose is to destroy physical equipment.
- Ransomware
- Attacks on IoT devices
◆Information exploitation
If the purpose is to steal information, the attacker often does not notice the damage because there is no visible loss even if the information is stolen.
- targeted attack
- SQL injection
- social hacking
Types of cyber attacks based on how they spread
Finally, there's the matter of how it spreads. There are two main ways in which cyberattacks spread:
◆Scattered attack
They attacked all over the world at once, believing that even a poorly made gun could hit a target with just a few shots.
◆Targeted attack
Attacks on targeted companies and organizations
Examples of cyber attacks
WannaCry spread
This incident highlighted the great damage caused by ransomware in Japan. The infection spread to a fairly wide area, including major companies, and became a hot topic. What is noteworthy is that it caused a major hindrance to actual business operations. This was a huge shock to people who thought that information would not be lost even if it was stolen.
Online game DDoS attack incident
This is the first incident of a DDoS attack detected in Japan. What is noteworthy is that the person arrested was a first-year high school student. In 2016, the age group of those arrested for cyber crimes was 31%, which was the highest among minors, and in the future it will be necessary to be careful about cyber attacks from within Japan.
lastly
How was it? The cyber attacks summarized in this article are just a few; there are many more cyber attacks in the world. Understanding the characteristics of attacks for each category may make it easier to consider countermeasures when new cyber attacks appear.Please feel free to use it as a reference.
[Reference site]
・Cyber attacks | National Police Agency
・The latest security threats and countermeasures | NPO Japan Network Security Association
・The threat situation surrounding cyberspace in 2018 | National Police Agency
Achievements left behind
48 years since its establishment.
We have a proven track record because we have focused on what is important.
It has a long track record in both the public and private sectors.
Number of projects per year
500 PJ
Annual number of business partners/customers
200 companies
Maximum number of trading years
47 years
Total number of qualified persons
1,870 people