Our society is becoming more advanced, and the ongoing digitalization is bringing with it countless benefits. However, it makes us more vulnerable to the thousands of daily cyber-attacks on the web. In Module 6 “Agents of threat” of C1b3rWall Academy, Juanma Cabo Pimentel, Judicial Police investigator and head of the Cyberattack Group at the Central Cybercrime Unit discussed the types of cyberattacks that are most common in Spain and exaplined what their consequences are.

A cyberattack must be understood as the action, or a set of actions, that compromises the confidentiality, integrity or availability of a computer system or the information contained therein.

Most common cyberattacks

Juanma explains the most frequent cyberattacks in Spain.

Denial of service. There are several types:

PDos: Hardware sabotage. The attacker locks the device or blocks the firmware completely. The victim who suffers a PDoS attack has no choice but to repair the device or even buy a new one.

TDoS: DoS/DDoS against telephony service terminals. The attacker launches a large number of calls and keeps them active for as long as possible against the target network. Disrupts communications.

Man in the middle (MITM): consists of introducing a device or malware in the middle of the traffic to capture all communications, including banking information.

Brute-force attacks: this is a method of obtaining a password by trying all possible combinations until the one that allows access is found. It requires a lot of processing power and probability comes into play. It is usually combined with an attack, from which words are taken and introduced as passowrds.

Data theft: data is stolen from organizations and published on forums or social networks, or sold on the dark web. The main motivations are profit motives, animus laedendi or to increase the ego or fame of the person stealing the data.

Malware: this is the spearhead of cyber-attacks. It is a computer program that deploys a series of (negative) functionalities without the victim’s consent. The most common ones are banking Trojans and data-encrypting ransomware.

Ransomware: its objective is to block the use of the device or part of its information and demand a ransom in exchange for its release. There are blockers, which block the device’s functions, and encryption ransomware, which encrypts the contained data.

These are just some of the attacks we can fall victim to on the Internet. If you would like to learn a little more about this topic, don’t miss Juanma’s lecture on C1b3rWall Academy.

Here is the link to the full article published on News-365.

Posted by Juan M. Corchado

Juan Manuel Corchado (15 May 1971, Salamanca, Spain) is Professor at the University of Salamanca. He has been Vice-Rector for Research from 2013 to 2017 and Director of the Science Park of the University of Salamanca. Elected as Dean of the Faculty of Science twice, he holds a PhD in Computer Science from the University of Salamanca and a PhD in Artificial Intelligence from the University of the West of Scotland. He leads the renowned BISITE (Bioinformatics, Intelligent Systems and Educational Technology) Research Group, created in 2000. Director of the IoT Digital Innovation Hub and President of the AIR Institute, J. M. Corchado is also Visiting Professor at the Osaka Institute of Technology since January 2015, Visiting Professor at the Universiti Malaysia Kelantan and Member of the Advisory Group on Online Terrorist Propaganda of the European Counter Terrorism Centre (EUROPOL). J. M. Corchado has been president of the IEEE Systems, Man and Cybernetics Society, and academic coordinator of the University Institute for Research in Art and Animation Technology at the University of Salamanca, as well as researcher at the Universities of Paisley (UK), Vigo (Spain) and the Plymouth Marine Laboratory (UK). He currently combines all his activity with the direction of Master programmes in Security, Digital Animation, Mobile Telephony, Information Systems Management, Internet of Things, Social Media, 3D Design and Printing, Blockchain, Z System, Industry 4.0, Agile Project Management, and Smart Cities & Intelligent Buildings, at the University of Salamanca and his work as editor-in-chief of the journals ADCAIJ (Advances in Distributed Computing and Artificial Intelligence Journal), OJCST (Oriental Journal of Computer Science and Technology) or Electronics MDPI (Computer Science & Engineering section). J. M. Corchado mainly works on projects related to Artificial Intelligence, Machine Learning, Blockchain, IoT, Fog Computing, Edge Computing, Smart Cities, Smart Grids and Sentiment Analysis. He has recently been included in the board of trustees of the AstraZeneca Foundation, along with other health professionals and researchers recognised for bringing scientific knowledge closer to society.

Thanks for your comment

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.