Cyber attacks come in many different forms, and the type of attack on any particular company depends on the type of information the intruder is looking for. (Photo: Shutterstock)
Interest in cyber coverage is at an all-time high, and those who previously thought it a luxury — or not a necessity — are taking a much closer look at their exposures.
A recent Marsh report shows that cyber insurance purchases grew 32% in 2014 when compared with 2013, and up 21% in 2013 over 2012. “The yearly increase shows that organizations see cyber as a risk to be managed, not merely a problem to be fixed by IT,” the report asserts.
Damian Caracciolo, vice president and practice leader at CBIZ Management & Professional Risk, said that cyber attacks affect all industries, but the type of attack deployed depends on the industry to which the company being targeted belongs. In 2015, the health care, financial services, retail and education sectors were those that saw the greatest number of cyber incidents.
Caracciolo said that cyber attacks come in many different forms, and the type of attack on any particular company depends on the type of information the intruder is looking for. Here are the five major types of attacks to which your organization would be vulnerable:
Brute force attacks search for vulnerabilities and attack password-protection mechanisms. (Photo: iStock)
1. Brute force attack
A very sophisticated software or algorithm which is written to do whatever it can to attack your system — by searching for vulnerabilities — and in many cases, attacks a password-protection mechanism.
The brute force attack will use a specially designed software to go through hundreds of thousands of different words, combinations of words and numbers to try to crack your password, said Caracciolo of CBIZ. He added: “They will even go through every word in the dictionary to see if they can access something like a password.”
Social engineering fraud doesn’t target data, it targets the money. (Photo: iStock)
2. Social engineering/cyber fraud
“If you’re in the treasury department, and I send you an e-mail that looks like it’s coming from the CEO or CFO requesting that you ‘wire funds on the merger acquisition that we have pending, I would like that money wired today — this is your authorization to get it done,’ whoever is working in that accounting or treasury department will wire the money,” said Caracciolo.
He added that they’re not attacking your system, they’re attacking individuals, and the company’s wire-transfer policies and procedures: “We’re seeing a prevalence of that today, and that’s significant because the losses tend to be in seven figures. This type of attack doesn’t target data, it targets the money and once it’s transferred it’s unlikely that you’re able to retrieve that money.”
DDoS attack overloads the target’s website or network system, ultimately shutting it down. (Photo: iStock)
3. Distributed Denial of Service attack (DDoS)
This happens when a server is overloaded with connections, with a goal of ultimately shutting down the target’s website or network system. “This is just where [hackers] are overloading your system, hoping it will shut down your network and you will not be able to operate your business.”
Phishing is probably the most commonly reported form of cyber-attack. (Photo: iStock)
4. Phishing attacks
Phishing is is perhaps the most commonly reported form of cyber attack, said Caracciolo, and keeping up with the methods of some phishing attacks is proving to be very difficult.
There are various types of phishing attacks and the type that is used usually depends on the industry. “Hackers send out hundreds of thousands of emails [with an attachment or link] hoping that someone will click on them,” he added. “That’s the hacker’s means to access your system.” Once you open it, you’re giving them access to your computer system and the information on it.
“Once they’re in, then they’re able to really attack the software’s vulnerabilities, whether it’s personal passwords, firewall or lack thereof, or unpatched status security software.”
If malware is introduced into your system, it could erase all the information contained on your hardware. (Photo: iStock)
5. Malware, spyware, ransomware
Each of these types of attack has its own objectives. Any one of those is an attack on your software, your systems, your theft prevention software — getting access through any one of the malware type of attacks.
“It’s basically a malicious software with the intent to gain unauthorized access and that could include viruses, spyware,” he explains, “and more recently, we’ve see ransomware where they’ll lock down your system and essentially say ‘we have your data, if you want it back you’re going to pay a ransom and we’ll let you gain access back to your information.’” Caracciolo added that there are also Trojan horses and key loggers that track keystrokes to gain access to passwords or gain access to your system.
If the malware is introduced into your system, it will cause the intended damage, and that intended damage could be erasing all the information contained on your hardware.
Other types of malware target individuals who probably aren’t with the IT department and may not have the same level of sophistication or even paying attention, he noted. “You’re busy, you get an email, you don’t pay much attention to who it’s from or if it’s an accurate email address, you click and allow them access to your system. It’s as simple as that. Whether it’s a link or an attachment, you basically provide that malware into your system, which will then accomplish whatever the objective is.”
As for spyware, hackers introduce a software into your system that looks for the simplest form to track keystrokes to get passwords or electronically spy on your network, whether to gain access to confidential information or spying in order to gain access to unidentifiable information.
A “worm” is similar to a virus but it spreads differently. In order to affect your files, a worm eats into your system and runs on its own. If a worm is introduced into your system, it could replicate by resending itself from your system to everyone in your contacts list; so one person lets it in and then it just compounds itself; depending on how it’s written, it could get back to every contact on your list.
Jun 24, 2016 | By Trudy Knockless