Types of Cyber Attacks

Understanding the threat landscape is the first step in defense. Here are the most common vectors used by attackers.

Social Engineering

Most Common

Phishing

Attackers masquerade as trusted entities (e.g., banks, Instagram) via email or SMS to steal sensitive data like login credentials or credit card info.

Defense: Verify sender email addresses and never click suspicious links. Use 2FA.
High Risk

Pretexting

The attacker creates a fabricated scenario (pretext) to pressure a victim into divulging information, often impersonating bosses or IT support.

Malware Attacks

Critical

Ransomware

Malware that encrypts a victim's files. The attacker demands a ransom from the victim to restore access to the data.

Defense: Regular offline backups and up-to-date antivirus software.
High

Spyware & Keyloggers

Software that secretly records user activity, keystrokes, and data, sending it to the attacker without the user's knowledge.

High

Trojan Horse

Malicious software disguised as legitimate programs. Once installed, it creates a backdoor for attackers to access the system.

Web & Network Attacks

Critical

SQL Injection (SQLi)

Attackers interfere with the queries an application makes to its database, allowing them to view or modify data they shouldn't access.

Defense: Use prepared statements and parameterized queries.
High

DDoS

Distributed Denial-of-Service. Flooding a server with traffic from multiple sources to crash it and make it unavailable to users.

Medium

Man-in-the-Middle (MitM)

Attackers secretly intercept and possibly alter the communication between two parties who believe they are communicating directly.

🔥 Real-World Case Studies (2025-26)

Healthcare Target

1. Ransomware on Healthcare Network

What happened: Ek major healthcare provider ke systems encrypt karke ransom demand ki gayi.

Impact: Patient records inaccessible, treatment delays, and critical backup dependency.

Why it matters: Healthcare is hit often because they can't afford any downtime.

BleepingComputer
Zero-Day

2. Zero-Day in Email Servers

What happened: Attackers ne Zero-Day vulnerability in enterprise mail servers me exploit kiya before any patch existed.

Impact: Remote code execution, Data exfiltration (emails leaked), and credential theft.

Mitigation: Patch immediately, disable external admin access.
Mobile Security

3. Android Banking Trojan

What happened: Fake banking apps Play Store aur sideloaded sources par distribute hue to capture logins.

Impact: Bank accounts compromise, SMS 2FA bypass attempts.

Protection: Only use official stores, verify APK installers.
Automation

4. Large-Scale Credential Stuffing

What happened: Attackers leaked passwords ko automated bots ke sath millions of login attempts me use kar rahe hain.

Impact: Account takeovers, unauthorized access across multiple services.

Advice: Unique passwords for every site & enable MFA.

Software Link

5. Supply Chain Backdoor

What happened: Legitimate software updater process me malicious backdoor inject kiya gaya.

Impact: Thousands of organizations infected via one "trusted" update.

Defense: Code signing verification & network behavioral monitoring.
Infrastructure

6. Cloud Services Data Breach

What happened: Cloud provider employee credentials compromised, leading to customer data exposure.

Impact: Client secrets leaked, leading to secondary downstream attacks.

Lessons: Least privilege access (IAM) & frequent secret rotation.