In this post we are going to look at more Internet Security Threats we may encounter while online. We are going to look at Threats H Through Z and find out, What they are? and What they do?
So let’s get right into
Internet Security Threats H – Z
- Hacker – Term used to describe an individual
who uses their computer skill and knowledge to “Hack” into computers,
networks and systems to conduct criminal online activities.
- Hacktivist – is an individual or group that
most commonly has a social or political agenda it wants to promote, so
they try to gain unauthorized access “Hack” into networks, computers and
or systems. Hacktivists more often than not engage in some type of
Cyber-Terrorism. The term is a hybrid of the words “HACKer” and “acTIVIST“
- Internet Relay Chat (IRC) – Are some of the
first generations of Botnets used for criminal intentions. These Botnets
are easy to make and manage but are very easy to identify and shutdown.
The servers used and the Botmaster are also easy to identify.
IRC Botnets are making a comeback due to certain advancements and
with the use of multiple C&C servers which allows Cyber-Criminals to
use an IRC Botnet with a smaller risk of being identified and shut
- Keyloggers – Software designed to allow Bots to
collect information associated with specific Keyboard strokes. If, the
Keylogger is running this software on multiple computers over the Botnet
system it doesn’t take long for a Cyber-Criminal to gather sensitive
data and information.
- Macro – Virus written in Macro language launch through an or Microsoft Word file attachment.
- Malware – Designed solely to cause harm to
networks, systems, data, computers, and devices. Uses various malicious
tools such as AdWare, Spyware, Viruses, Worms, Ransomware, Scareware,
etc. The term is a hybrid of the word “MALicios” and “softWARE“
- Malvertising – Uses online advertising to
distribute and spread Malware. This type of attack is launched by
inserting Malicious advertisements onto legitimate advertising networks
and web sites. The malicious Malware is spread very easily because they
appear on legitimate sites and people are tricked into believing it is
The term is a hybrid of the words “MALware” and “adVERTISING”
- Man-In-The-Middle (MITM) – An attack launched
by a Cyber-Criminal who puts himself between two parties in a
communication, with the intention of impersonating one or both parties
in order to gain unauthorized access or to intercept confidential or
sensitive data. Such as passwords, documents and or bank account, credit
- Packer – Compressed malicious software that when launched “Un Packs” itself in computer memory.
- Payload – The actual part of a malicious program that is designed to cause damage or perform a malicious action.
- Phishing – Attack carried out to try to trick a person or persons into divulging their personal information which the “Phisher” can use to make money. Phishing is a very popular type of scam, Cyber-Criminals will send out Emails and or Advertising en mass.
These Emails and Advertising give the appearance of originating from legitimate sources with the sole purpose to steal your information. The type of information they are trying to access is passwords, user names, credit cards, and banking information.
- Protector – Element that is hidden in Malware that acts as an Encryptor and Packer which helps to prevent the tampering or re-engineering of the Malware.
- Peer-To-Peer Botnet (P2P) -The P2P Botnet uses a decentralized network of Bots for added security and protection from discovery and the shut down of these Botnets. P2P Botnets can operate with or without C&C servers and are made to randomly obfuscate the Botnets and its function.
- RootKit – A Malicious software attack that allows access to otherwise inaccessible parts of the computer such as systems and or software. This Malware will most often contain Root Kits that allow modification to the operating system. This modification allows the Malware to be concealed from the user.
- Ransomware – Type of attack that blocks or limits authorized user access to computers, devices or entire network systems until a “Ransom” is paid to the perpetrators of the attack.
- Sniffing – Bot that can be used to spy on or “Sniff” for specific data and or text entering an infected computer or device such as passwords, usernames, etc.
- Snowshoeing – Type of Spam messaging attack using multiple Domains and IP Addresses to send junk or Spam Emails to recipients. In most cases, these attacks are structured in a way that the IP Addresses send out low volumes of messages to by-pass and prevent blocking from Spam Filtering programs.
- SpyWare – Malicious software that Spies on computer and device users. This type of software is designed to Spy on Emails, files, documents and can also be used to capture keystrokes. They can also be used to turn on webcams and video cameras.
- Spear Phishing – Phishing attack targeting a specific person or persons. These types of attacks are commonly launched against government officials, executives, and celebrities or other high profile individuals.
- Social Engineering – Term most often used to describe a Cyber-Criminal involved in the psychological manipulation of an intended target and to get them to act in a manner they normally would not. Such as divulging personal or sensitive information or to open or “Click” on a malicious document or link.
- Steganography – Is a technique used to obfuscate a video, file, message, or image in another video, file, message or image. These malicious files’ are indistinguishable from the real files’ and can be stored on infected websites or legitimate image sharing platforms. The downloaded malicious files’ are almost completely hidden in normal internet browsing traffic.
- Threat Vector – The delivery method used to send any type of threat to the intended target.
- Trojan – Malicious non-replicating software that contains a hidden function of some sort.
- TOR-Based-Botnets – TOR itself is an anonymous internet platform that allows the user to send and receive encrypted data and information through a series of interconnected servers along the TOR network. TOR provides anonymity by hiding the users’ true location.
Some Cyber-Criminals have started to use TOR to hide their C&C servers which also operate with a common IRC protocol.
- Virus – Malicious software used to infect a network, system or computer that is designed to harm, alter, or damage data or a program on the system.
- Vulnerability – Flaw or weakness in the network, software or system. These are used by Cyber-Criminals to gain unauthorized access or “Hack” into the system. They can also be the focus of a constant targeted attack.
- Vishing – Attack that uses Social Engineering via phone calls. This type of attack uses automated phone messages to obtain sensitive personal information from its intended victims. The term “Vishing” is a hybrid of the words “Voice” and “PhISHING“.
- Worms – Malicious software that is designed to self replicate itself through a computer network and eventually will infect all the computers within the network.
- Watering Hole – Attack which infects websites frequented by the targeted person, persons or organization. The idea is to infect these websites with malware with the goal of eventually infecting the intended target.
- Whaling – Attack commonly targeting high profile individuals. This type of attack is carried out with the use of Emails being sent requesting the targeted recipient to perform some type of task. It could be to send a wire, respond to a complaint or a legal request. The email could also contain a malicious link.
- Zombie – Alternate term used to describe a Bot, since the Bot is under the control of a person or device. Conversely, a Botnet is referred to as a “Zombie Army”.
- Zero-Day-Attack – A Cyber-Criminal will leverage an otherwise unknown vulnerability in a system, network or software with criminal intent. These attacks are usually launched against software developers, Cyber-Security professionals, and the general public.
We Are Done!!!
As mentioned at the beginning of this post we were going to look at Internet Security Threats H through Z, So I hope you found the Second part of the glossary of Internet Security Threats informative. We covered most known threats we face, I hope that you have found these two posts informational and help to shine a light on the evergrowing number of threats that Cyber-Criminals use to seal our information.
I hope you enjoyed this post and if you have any questions or just want to leave a comment please do so below
Stay secure and always practice
Safe Text !!!