Our society is becoming more advanced, and the ongoing digitalization is bringing with it countless benefits. However, it makes us more vulnerable to the thousands of daily cyber-attacks on the web. In Module 6 “Agents of threat” of C1b3rWall Academy, Juanma Cabo Pimentel, Judicial Police investigator and head of the Cyberattack Group at the Central Cybercrime Unit discussed the types of cyberattacks that are most common in Spain and exaplined what their consequences are.

A cyberattack must be understood as the action, or a set of actions, that compromises the confidentiality, integrity or availability of a computer system or the information contained therein.

Most common cyberattacks

Juanma explains the most frequent cyberattacks in Spain.

Denial of service. There are several types:

PDos: Hardware sabotage. The attacker locks the device or blocks the firmware completely. The victim who suffers a PDoS attack has no choice but to repair the device or even buy a new one.

TDoS: DoS/DDoS against telephony service terminals. The attacker launches a large number of calls and keeps them active for as long as possible against the target network. Disrupts communications.

Man in the middle (MITM): consists of introducing a device or malware in the middle of the traffic to capture all communications, including banking information.

Brute-force attacks: this is a method of obtaining a password by trying all possible combinations until the one that allows access is found. It requires a lot of processing power and probability comes into play. It is usually combined with an attack, from which words are taken and introduced as passowrds.

Data theft: data is stolen from organizations and published on forums or social networks, or sold on the dark web. The main motivations are profit motives, animus laedendi or to increase the ego or fame of the person stealing the data.

Malware: this is the spearhead of cyber-attacks. It is a computer program that deploys a series of (negative) functionalities without the victim’s consent. The most common ones are banking Trojans and data-encrypting ransomware.

Ransomware: its objective is to block the use of the device or part of its information and demand a ransom in exchange for its release. There are blockers, which block the device’s functions, and encryption ransomware, which encrypts the contained data.

These are just some of the attacks we can fall victim to on the Internet. If you would like to learn a little more about this topic, don’t miss Juanma’s lecture on C1b3rWall Academy.

Here is the link to the full article published on News-365.

Posted by Juan M. Corchado

Juan Manuel Corchado (15 de Mayo de 1971, Salamanca, España) Catedrático en la Universidad de Salamanca. Ha sido Vicerrector de Investigación desde el 2013 hasta el 2017 y Director del Parque Científico de la Universidad de Salamanca. Elegido dos veces como Decano de la Facultad de Ciencias, es Doctor en Ciencias de la Computación por la Universidad de Salamanca y, además, es Doctor en Inteligencia Artificial por la University of the West of Scotland. Dirige el Grupo de Investigación Reconocido BISITE (Bioinformática, Sistemas Inteligentes y Tecnología Educativa), creado en el año 2000. Director del IOT Digital Innovation Hub y presidente del AIR Institute, J. M. Corchado también es Profesor Visitante en el Instituto Tecnológico de Osaka desde enero de 2015, Profesor visitante en la Universiti Malaysia Kelantan y Miembro del Advisory Group on Online Terrorist Propaganda of the European Counter Terrorism Centre (EUROPOL). J. M. Corchado ha sido presidente de la asociación IEEE Systems, Man and Cybernetics, y coordinador académico del Instituto Universitario de Investigación en Arte y Tecnología de la Animación de la Universidad de Salamanca e investigador en las Universidades de Paisley (UK), Vigo (Spain) y en el Plymouth Marine Laboratory (UK). En la actualidad compagina toda su actividad con la dirección de los programas de Máster en Seguridad, Animación Digital, Telefonía Movil, Dirección de Sistemas de Información, Internet de las Cosas, Social Media, Diseño e Impresión 3D, Blockchain, Z System, Industria 4.0, Gestión de Proyectos Ágiles y Smart Cities & Intelligent Buildings​, en la Universidad de Salamanca y su trabajo como editor jefe de las revistas ADCAIJ (Advances in Distributed Computing and Artificial Intelligence Journal), OJCST (Oriental Journal of Computer Science and Technology) o Electronics MDPI (Computer Science & Engineering section). J. M. Corchado desarrolla principalmente trabajos en proyectos relacionados con Inteligencia Artificial, Machine Learning, Blockchain, IoT, Fog Computing, Edge Computing, Smart Cities, Smart Grids y Análisis de sentimiento.

Thanks for your comment

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.