{"id":24943,"date":"2021-02-05T08:46:29","date_gmt":"2021-02-05T07:46:29","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=24943"},"modified":"2021-02-08T09:51:46","modified_gmt":"2021-02-08T08:51:46","slug":"types-of-cyber-attacks","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/blog-ciberseguridad\/tipos-de-ciberataques\/","title":{"rendered":"The club of 7 supers (cyber attacks)"},"content":{"rendered":"<p>There are several <strong>types of cyber attacks<\/strong> that compromise the security of an information system and many of them are intended to steal the information of the attacked, whether they are users, web pages, companies, banks, among other objectives. The way in which the cyberattack is carried out will depend on the security that the cybercriminal faces and their experience as <em>hacker<\/em> and, although the vast majority choose to insert malware into the victim&#039;s device, there are several other ways to get hold of it. <strong>the precious treasure of information<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"428\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/02\/tipos-de-ciberataques.jpeg\" alt=\"7 types of cyber attacks\" class=\"wp-image-25013\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/02\/tipos-de-ciberataques.jpeg 640w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/02\/tipos-de-ciberataques-300x201.jpeg 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/02\/tipos-de-ciberataques-247x165.jpeg 247w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/02\/tipos-de-ciberataques-190x126.jpeg 190w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<p>In our Master in Cybersecurity Management, Ethical Hacking and Offensive Security, you will learn the details of cybersecurity professionals. These are the 7 most prominent types of cyber attacks:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1 <strong>Man in the Middle<\/strong><\/h2>\n\n\n\n<p>The concept of this attack, as the name \u201cman in the middle\u201d indicates, is very simple. <strong>The attacker places himself between his target and the source of the data to steal the information<\/strong>, impersonate it or intercept it and impersonate it.<\/p>\n\n\n\n<p>The most common method of carrying out this attack is by configuring a router or computer as a Wi-Fi network, naming it <strong>as if it were a public network<\/strong> (library, hotel or cafeteria). It then waits for the victims to connect to its network and start browsing to capture their passwords.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2 BackDoor<\/h2>\n\n\n\n<p>As its name indicates, it is a \u201cback door\u201d through which cybercriminals <strong>They can take full control of the team<\/strong>. They will be able to send and receive files, install new applications, delete data, steal information and even restart the computer.<\/p>\n\n\n\n<p>The reasons why a \u201cbackdoor\u201d exists may vary, it may have been created by the developer himself, because it was created when installing a program or due to some vulnerability in the system.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3 Phishing<\/h2>\n\n\n\n<p>In this type of attacks, cybercriminals send emails <strong>impersonating well-known companies<\/strong> such as Amazon, Netflix or banking companies, among other possibilities. for like this <strong>gain user trust<\/strong> and thus make you download the file that has the attached email or click on the link to redirect you to a fake website and steal your credentials.<\/p>\n\n\n\n<p>You have a very clear example in this post \u201c<a class=\"rank-math-link\" href=\"https:\/\/eiposgrados.com\/eng\/cybersecurity-blog\/dont-open-trumps-video\/\">Don&#039;t open Trump&#039;s video, it&#039;s a trap<\/a>&quot; from a few days ago.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4 Ransomware<\/h2>\n\n\n\n<p>It is a type of malware that <strong>blocks the infected user&#039;s computer<\/strong>, preventing access to your system or files and usually requiring the payment of a ransom to free the computer.<\/p>\n\n\n\n<p>Among all types of cyberattacks, ransomware is very well known and we have already talked about it in our article \u201c<a href=\"https:\/\/eiposgrados.com\/eng\/cybersecurity-blog\/failed-ransomware-attack-on-endesa\/\" class=\"rank-math-link\">Failed ransomware attack on ENDESA<\/a>\u201c.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5 DDOS ATTACK<\/h2>\n\n\n\n<p>The DDoS attack basically focuses on blocking websites or online services with the<strong> high traffic injection<\/strong> with the purpose of <strong>stop working and being available to users<\/strong>. The target of a DDoS attack can be, for example, a company mail server&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">6 SQL Injection<\/h2>\n\n\n\n<p>In this attack, the cybercriminal \u201cinjects\u201d SQL instructions into the victim&#039;s database with the intention of manipulating the database at will. They could modify the results of our queries, falsify data, identities, <strong>get any information<\/strong> of the DB (passwords, emails or addresses), delete it, change the name of the tables, anything that comes to mind.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">7 Malware Attack<\/h2>\n\n\n\n<p>The definition of Malware is &quot;malicious software&quot; and it fits perfectly. It is a program that is installed on our system, whether mobile phones, tablets, or PCs, and whose purpose can range from spying on us to trying to extort money from us through some type of blackmail, as in the case of Ransomware. In the article &quot;<a class=\"rank-math-link\" href=\"https:\/\/eiposgrados.com\/eng\/cybersecurity-blog\/malware-in-times-of-covid\/\">Malware in times of Covid<\/a>&quot;We go into detail about this type of attack.<\/p>\n\n\n\n<p>We must keep in mind that a malware attack would not work without us, I have always said that <strong>the best antivirus is common sense<\/strong>, the malware can come wrapped in a program downloaded from an unsafe website, as an attachment in an email or as a gift on a borrowed pendrive, for example. If it is not executed, the malware would not be installed and would come to nothing.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/02\/muer-lanzando-un-ciberataque-1024x683.jpg\" alt=\"died launching a cyber attack\" class=\"wp-image-25018\" width=\"571\" height=\"380\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/02\/muer-lanzando-un-ciberataque-1024x683.jpg 1024w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/02\/muer-lanzando-un-ciberataque-300x200.jpg 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/02\/muer-lanzando-un-ciberataque-768x512.jpg 768w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/02\/muer-lanzando-un-ciberataque-1536x1024.jpg 1536w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/02\/muer-lanzando-un-ciberataque-2048x1365.jpg 2048w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/02\/muer-lanzando-un-ciberataque-248x165.jpg 248w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/02\/muer-lanzando-un-ciberataque-190x126.jpg 190w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/02\/muer-lanzando-un-ciberataque-scaled.jpg 1920w\" sizes=\"(max-width: 571px) 100vw, 571px\" \/><\/figure>","protected":false},"excerpt":{"rendered":"<p>We expose the types of cyber attacks that exist. The club of the 7 supers (cyber attacks) that you must prevent and know how to fight against them.<\/p>","protected":false},"author":51,"featured_media":25013,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[332],"tags":[],"class_list":["post-24943","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/24943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/51"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=24943"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/24943\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/25013"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=24943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=24943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=24943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}