What is a cyber attack? Explaining the types and examples

What is a cyber attack? Explaining the types and examples

table of contents

"Cyber ​​attacks" are something we often hear about in the news these days. Their types and contents change over time. As the information society progresses, life becomes more convenient, but at the same time the risk of cyberattacks increases. So this time, Explaining what types of cyber attacks there are, along with examples that have occurred in the past.To do.


Types of cyber attacks

There are different types of cyberattacks, and their backgrounds vary widely. Learn the background behind cyberattacks and deepen your understanding of them by putting yourself in the position of the attacker.

In this article, we will classify cyber attacks from the following three perspectives.

  • Attacker image
  • Attack method
  • How to spread

Before that, let's first take a look at what the purpose of a cyber attack is.


What is the purpose of a cyber attack?

If you think about it from the perspective of someone who launches a cyber attack, there is always a purpose behind the attack. By understanding the attacker's objectives, you will know what you need to protect, and it will be easier to take security measures.

Mischief and self-exhibitionism

Many of the activities of people traditionally called hackers were crimes for fun. For them, cyberattacks were carried out to demonstrate their technological prowess to the world. For this purpose, There are many types of cyber attacks that are noticeable, making it easy to notice that you have been attacked.For example, the following cyber-attacks may also be carried out for this purpose.

  • Website tampering
  • joke virus
  • browser crusher


financial purpose

In recent years, the activity of hackers aiming to obtain money has increased. Nowadays, due to the information society, The value of IT as a whole is increasing, and the reward amount for a successful attack is increasing.Therefore, there are many criminal groups that make a living from cyber attacks. For example, the following cyber-attacks may also be carried out for this purpose.

  • Phishing
  • Ransomware
  • mining malware


Service interference and harassment

This is a cyber attack aimed at damaging a rival company or harassing someone with whom you have a grudge. For example, the following cyber-attacks may also be carried out for this purpose.

  • DDoS attack
  • SNS account spoofing


espionage and political activities

Cyber ​​attacks are widely used in intelligence activities. Recently, election-related cyber attacks have also occurred and attracted attention. For example, the following cyber-attacks may also be carried out for this purpose.

  • fake news
  • Exploitation and leak of politically incorrect information
  • SS7 call eavesdropping


Types of cyber attacks by attacker profile

In the previous chapter, we explained the purpose of cyber attacks. In the chapters that follow, we will look at each classification.

Attackers in cyberattacks can be broadly classified as follows. The attack methods and objectives vary greatly depending on the position of the person planning the cyber attack.

◆Individual

Attacks launched by individuals are often motivated by mischief or grudges.

◆Criminal organization

Attacks launched by criminal organizations are businesses, so their purpose is often to obtain money. Most targets are private companies or individuals.

◆Nation

Attacks launched by states often have strong political implications, as the target is often at the national level. Furthermore, countries at war are constantly engaged in intense cyber warfare.


Types of cyber attacks by attack method

Next, let's take a look at the types of cyber attacks by attack method.

◆Sabotage activities

Since data loss is often the goal, you can prevent this by backing up your data. In some cases, the purpose is to destroy physical equipment.

  • Ransomware
  • Attacks on IoT devices

◆Information exploitation

If the purpose is to steal information, the attacker often does not notice the damage because there is no visible loss even if the information is stolen.

  • targeted attack
  • SQL injection
  • social hacking


Types of cyber attacks based on how they spread

Finally, there's the matter of how it spreads. There are two main ways in which cyberattacks spread:

◆Scattered attack

They attacked all over the world at once, believing that even a poorly made gun could hit a target with just a few shots.

◆Targeted attack

Attacks on targeted companies and organizations


Examples of cyber attacks

WannaCry spread

This incident highlighted the great damage caused by ransomware in Japan. The infection spread to a fairly wide area, including major companies, and became a hot topic. What is noteworthy is that it caused a major hindrance to actual business operations. This was a huge shock to people who thought that information would not be lost even if it was stolen.


Online game DDoS attack incident

This is the first incident of a DDoS attack detected in Japan. What is noteworthy is that the person arrested was a first-year high school student. In 2016, the age group of those arrested for cyber crimes was 31%, which was the highest among minors, and in the future it will be necessary to be careful about cyber attacks from within Japan.


lastly

How was it? The cyber attacks summarized in this article are just a few; there are many more cyber attacks in the world. Understanding the characteristics of attacks for each category may make it easier to consider countermeasures when new cyber attacks appear.Please feel free to use it as a reference.


[Reference site]
Cyber ​​attack | National Police Agency
Latest security threats and countermeasure points | NPO Japan Network Security Association
Regarding the threat situation surrounding cyberspace in 2018 | National Police Agency


Achievements left behind

48 years since its establishment.
We have a proven track record because we have focused on what is important.
It has a long track record in both the public and private sectors.

Number of projects per year

500 PJ

Annual number of business partners/customers

200 companies

Maximum number of trading years

47 years

Total number of qualified persons

1,870 people