Know the types of cyber threats (2024)

Cyber threats change at a rapid pace. Tactics and attack methods are changing and improving daily.

Cyber criminals access a computer or network server to cause harm using several paths. This is also called an attack vector.

Common ways to gain access to a computer or network include:

  • Removablemedia such as flash drives
  • Brute force attack using trial and error to decode encrypted data
  • Web or email attacks
  • Unauthorized use of your organization's system privileges
  • Loss or theft of devices containing confidential information

The Division of Banks (DOB) encourages all financial institutions and non-depository financial institutions to develop detailed cybersecurity policies to deter attacks.

Types of cyber threats your institution should be aware of include:

  • Malware
  • Ransomware
  • Distributed denial of service (DDoS) attacks
  • Spam and Phishing
  • Corporate Account Takeover (CATO)
  • Automated Teller Machine (ATM) Cash Out

Malware

Malware is also known as malicious code or malicious software. Malware is a program inserted into a system to compromise the confidentiality, integrity, or availability of data. It is done secretly and can affect your data, applications, or operating system. Malware has become one of the most significant external threat to systems. Malware can causewidespread damage and disruption, and requires huge efforts within most organizations.

Spyware, a malware intended to violate privacy, has also become a major concern to organizations. Although privacy-violating malware has been in use for many years, it has become much more common recently. Spyware invades many systems to track personal activities and conduct financial fraud.

Organizations also face similar threats from several forms of non-malware threats. These forms of cyber threats are often associated with malware. A more common form is phishing. Phishing involves tricking individuals into revealing sensitive or personal information.

Tips for preventing Malware from the National Institute of Standards and Technology (NIST) Guide to Malware Incident Prevention and Handling:

  • Require e-mail file attachments to be scanned and saved to local drives or removable media.
  • Don’t allow certain types of files (e.g., .exe files) to be sent or received by e-mail.
  • Restrict removable media, such as CDs or flash drives, on systems that are high risk.
  • Limit the number of users with administrator-level access or privileges.
  • Ensure systems are updated regularly with operating system and application upgrades and patches.

Ransomware

Ransomware prevents or limits users from accessing their system via malware. Ransomware asks you to pay a ransom using online payment methods to regain access to your system or data. Online payment methods usually include virtual currencies such as bitcoins. Ransomware is one of the most widely used methods of attacks.

Ransomware enters computer networks and encrypts files using public-key encryption. Unlike other malware, this encryption key stays on the cyber criminal’s server. Cyber criminals will request ransom for this private key.Cyber criminals are using encryption as a weapon to hold the data hostage.

Ransomware is hard to detect before it’s too late, and ransomware techniques continue to evolve. Because of this, your institution should focus on prevention efforts. Prevention efforts include training for employees and strong information security controls.

The DOB recommends developing strong business continuity plans and incident response plans. Plan development mayhelp in the event of a ransomware attack.

Distributed Denial of Service (DDoS) Attacks

DDoS attacks make an online service unavailable by overwhelming it with excessive traffic from many locations and sources. Website response time slows down, preventing access during a DDoSattack. Cyber criminals develop large networks of infected computers called Botnets by planting malware. A DDoS attack may not be the primary cyber crime. The attacks often create a distraction while other types of fraud and cyber intrusion are attempted.

TheFederal Financial Institutions Examination Council (FFIEC) issued a joint statement onDDoS attacks, risk mitigation, and additional resources.

Spam & Phishing

Spam includes unwanted, unsolicited, or undesirable messages and emails. Phishing is a form of social engineering, including attempts to get sensitive information. Phishing attempts will appear to be from a trustworthy person or business.

Cyber criminals pretend to be an official representative sending you an email or message with a warning related to your account information. The message will often ask for a response by following a link to a fake website or email address where you will provide confidential information. The format of the message will typically appear legitimate using proper logos and names. Any information entered into the fake link goes to the cyber criminal.

The FBI developed tips for preventing phishing attacks.

Corporate Account Takeover (CATO)

CATO is a business entity theft where cyber thieves impersonate the business and send unauthorized wire and ACH transactions. The unauthorized funds are sent to accounts controlled by the cyber criminal.

Many businesses are vulnerable to a CATO attack. Institutions with weak computer safeguards and minimal controls over online banking systems are easy targets. This form of cyber crime can result in largelosses. Cyber criminals use malware to infect a computer through e-mail, websites, or malware disguised as software.

The Conference of State Bank Supervisors (CSBS) developed a CATO best practices document.

Automated Teller Machine (ATM) Cash Out

ATM Cash Out is a type of large dollar value ATM fraud. Cash-outs involve simultaneous large cash withdrawals from several ATMs in many regions. It may also include large withdrawals at one ATM.

The Cash Out usually affects small-to medium-sized financial institutions. The attack involves changing the settings on ATM web-based control panels. Cyber criminals change the ATM's dispense function control to "Unlimited Operations."The “Unlimited Operations" setting allows withdrawal of funds over the customer's account balance or beyond the ATM’s cash limit. Stolen ATM or debit card information is often used to withdraw the funds. As a result, your financial institution can suffer large dollar losses.

The DOB recommends reviewing your control over information technology networks, card issuer authorization systems, systems that manage ATM parameters, and fraud detection and response processes to prevent ATM Cash Out attacks.

The FFIEC issued a joint statement aboutcyber attacks on financial institutions’ ATM and card authorization systems.

Know the types of cyber threats (2024)

FAQs

Know the types of cyber threats? ›

Threats can be classified in four categories: direct, indirect, veiled, or conditional.

What are the different types of cyber threats? ›

Know the types of cyber threats
  • Removable media such as flash drives.
  • Brute force attack using trial and error to decode encrypted data.
  • Web or email attacks.
  • Unauthorized use of your organization's system privileges.
  • Loss or theft of devices containing confidential information.

What are the 10 most common types of cyber attacks? ›

Common types of cyberattacks
  • Spoofing. ...
  • Backdoor Trojan. ...
  • Ransomware. ...
  • Password attacks. ...
  • Internet of Things attack. ...
  • Cryptojacking. ...
  • Drive-by download. ...
  • Denial-of-service attack. A denial-of-service attack causes an entire device or operating system to shut down by overwhelming it with traffic, causing it to crash.
Jan 24, 2024

What are the 7 types of cyber security? ›

It is helpful to understand the ten most commonly referenced types of cybersecurity.
  • Application security. ...
  • Cloud security. ...
  • Critical infrastructure security. ...
  • Data security. ...
  • Endpoint security. ...
  • IoT (Internet of Things) security. ...
  • Mobile security. ...
  • Network security.
Sep 29, 2023

What are the 4 types of threats? ›

Threats can be classified in four categories: direct, indirect, veiled, or conditional.

How many cyber threats are there? ›

How many people get hacked each year? With around 2,220 cyberattacks each day, that equates to over 800,000 attacks each year.

What are the four types of cyber attacks? ›

Types of Cyber Attacks
  • Malware Attack. This is one of the most common types of cyberattacks. ...
  • Phishing Attack. Phishing attacks are one of the most prominent widespread types of cyberattacks. ...
  • Password Attack. ...
  • Man-in-the-Middle Attack. ...
  • SQL Injection Attack. ...
  • Denial-of-Service Attack. ...
  • Insider Threat. ...
  • Cryptojacking.
Oct 11, 2023

What is the most common type of cyber threat? ›

Below are some of the most common types of cyber-attacks:
  • Malware.
  • Phishing.
  • Man-in-the-middle attack (MITM)
  • Distributed Denial-of-Service (DDoS) attack.
  • SQL injection.
  • Zero-day exploit.
  • DNS Tunnelling.
  • Business Email Compromise (BEC)
Feb 8, 2024

What are 3 types of cyber threats? ›

What are the 10 Most Common Types of Cyber Attacks?
  • Malware.
  • Denial-of-Service (DoS) Attacks.
  • Phishing.
  • Spoofing.
  • Identity-Based Attacks.
  • Code Injection Attacks.
  • Supply Chain Attacks.
  • Insider Threats.
Mar 20, 2024

What are the six types of cyber security threats? ›

The main types of cybersecurity threats that companies face today include malware, social engineering, web application exploits, supply chain attacks, Denial of Service attacks, and man-in-the-middle attacks.

What are the types of threats? ›

Threats can be classified into four different categories; direct, indirect, veiled, conditional. A direct threat identifies a specific target and is delivered in a straightforward, clear, and explicit manner.

What are the 5 types of cyber security in cyber security? ›

Types of Cybersecurity
  • Critical infrastructure security.
  • Application security.
  • Network security.
  • Cloud security.
  • Internet of Things (IoT) security.

What are the big 4 in cyber security? ›

In the grand scheme of prospective providers, the choices are primarily split between the “Big 4” (Deloitte, PwC, Ernst & Young, and KPMG) or boutique providers.

What are the 5 C's of cyber security? ›

This article discusses and explains the 5 C's of cybersecurity—Change, Continuity, Cost, Compliance, and Coverage—highlighting their importance in modern-day digital defense mechanisms.

What are the top 3 cyber security threats? ›

Top Cybersecurity Threats in 2023
  • Third Party Vulnerabilities (Vendors, Contractors, Partners)
  • Privacy Concerns With Connected Cars and Semi-Autonomous Vehicles.
  • Social Engineering.
  • A Severe Shortage of Cybersecurity Professionals.
  • What Companies Are Doing to Combat Cybersecurity Threats.

What are the four 4 major categories of cybercrimes? ›

The four major categories of cybercrimes include hacking, fraud, harassment, and identity theft. Protecting yourself and your information is crucial in today's digital world.

What are the three main types of threats? ›

Threats can be classified into three primary categories: natural, technological, and human-made.

Top Articles
Latest Posts
Article information

Author: Ray Christiansen

Last Updated:

Views: 5924

Rating: 4.9 / 5 (69 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Ray Christiansen

Birthday: 1998-05-04

Address: Apt. 814 34339 Sauer Islands, Hirtheville, GA 02446-8771

Phone: +337636892828

Job: Lead Hospitality Designer

Hobby: Urban exploration, Tai chi, Lockpicking, Fashion, Gunsmithing, Pottery, Geocaching

Introduction: My name is Ray Christiansen, I am a fair, good, cute, gentle, vast, glamorous, excited person who loves writing and wants to share my knowledge and understanding with you.