Skip to main content

TYPES OF HACK

TYPES OF HACK


VIRUSES AND WORMS
Most malware tends to be either a virus or a worm. The difference comes down to the software’s ability to propagate. Like their biological namesakes, computer viruses require a host body, whereas
worms can spread from one machine to the next unaided.


DDOS
Short for distributed denial of service, a DDOS attack is basic yet effective. It works on the principle that,
if a website’s DNS server can be overwhelmed by traffic requests, the site will crash. Hackers run
botnets – networks of zombie computers or devices – to besiege a server from multiple fronts simultaneously.


TROJANS
As its name suggests, a Trojan is a form of malware that sneaks into
your computer under an innocuous guise (like an email attachment). Its cargo
can be any form of malware. A Trojan’s specific ability is getting in, then
leaving a backdoor open for others to follow undetected.


RANSOMWARE
This subset of malware made the headlines for the WannaCry attack, but has been around since at least 2012. It searches for important files, encrypts them and
demands a ransom (usually paid in Bitcoin) for their safe return. In some cases,
the ransomware can lock down a machine rather than specific files.


SPEAR-PHISHING
An evolution of phishing (the spelling harks right back to early phone-based hacking, or ‘phreaking’), spear-phishing is more
direct, and consists of targeted campaigns, usually over email, to spread malware in a particular network or company.
The messages sent out would be laden with Trojans.

Comments