Website Malware

Risk: High

Website malware is malicious software used to infect or attack websites in order to steal, encrypt or delete sensitive information, alter or hijack website code and other malicious payloads.

Types: Virus, Worm, Trojan Horse, Spyware, Ransomware, Rootkit, Remote Access Trojan (RAT) or Backdoor Virus, Adware, Keyloggers, Mobile Malware

Brute Force

Risk: Very High

A brute force attack or exhaustive key search attack is a form of hacking that involves figuring out possible combinations of targeted passwords until the correct one is decoded.

Types: Simple Brute Force Attack, Hybrid Brute Force Attacks, Reverse Brute Force Attack, Credential Stuffing, Dictionary Attacks, Rainbow Table Attacks

SQL Injection

Risk: Medium

SQL injection (SQLi) attacks are done by inserting or “injecting” a SQL command via the user data input to enable it to read sensitive information from the database, modify database information (Insert/Update/Delete), execute admin operations on the database (such as shutdown the DBMS), and even issue commands to the operating system.

Types: In-band SQLi (Classic SQLi) Error-based or Union-based, Inferential SQLi (Blind SQLi) Boolean-based (content-based) Blind SQLi, Time-based Blind SQLi or Out-of-band SQLi

CSRF

Risk: Medium

CSRF or Cross-Site Request Forgery attacks involve sending malicious requests to users from authenticated sources via web applications. This type of attack aims to effect state changes like transfer funds or alter credentials rather than steal data as the attacker is unable to see the responses to the forged requests.

This attack may also be referred to as XSRF, Sea Surf, Session Riding, Hostile Linking, and One-Click attack. Types: URL Spoofing, Cross-Site Scripting (XSS), Malware

XSS

XSS or Cross-Site Scripting is a type of injection attack wherein a malicious script is inserted into trusted websites to access the end-user’s machine, usually to transmit sensitive data to the attacker.

Types: Stored XSS Attacks / Persistent or Type I, Reflected XSS Attacks / Non-Persistent or Type II, DOM Based XSS / Type-0, Server XSS, Client XSS

DoS/DDoS attacks

Distributed Denial-of-Service (DDoS) attacks use multiple compromised computer systems to overwhelm targeted servers or networks and their surrounding infrastructure in order to disrupt normal Internet traffic.

Types: Volume-Based Attacks, Protocol Attacks, Application Layer Attacks, UDP Flood, ICMP (Ping) Flood, SYN Flood, Ping of Death, Slowloris, NTP Amplification, HTTP Flood, Zero-day DDoS Attacks

Blacklisting

Blacklisting is creating a list of suspicious or malicious entities and blocking them from accessing a network or system.

Types: IP blacklisting, Domain blacklisting

Zero Day Attacks

Zero day attacks may be defined as exploits on unpatched vulnerabilities that have not been made public, or attacks on a vulnerability that are launched the same day (day zero) that it was announced.

Phishing

Phishing is an attack often disguised as a form of communication from a trusted entity that uses social engineering tactics to steal user information such as personal data, passwords and credit card numbers.

Categories: Vishing, Smishing, Angler Phishing, Search Engine Phishing, Spear Phishing, Whaling.

Types: Email Spoofing – Name Impersonation, Mass Target – Brand Impersonation, URL Phishing, Subdomain Attack, Pop-Up Messages: In-Session Phishing, Search Engine Attack, Website Spoofing, Scripting, Man-in-the-Middle Attack, Clone Phishing, Image Phishing, Voice Phishing Attack, CEO Fraud, Malware Injection

Compromised passwords

Compromised passwords (or compromised credentials) can grant intruders administrative access to personal accounts of users as well as servers, network devices and security mechanisms of organisations.

Vulnerability exploits

Vulnerability exploits are attacks that take advantage of a system’s security flaw using a code to remotely access the victim’s network.

Types: Zero-day Vulnerability, Broken Authentication, SQL Injection, Cross-Site Scripting, Cross-Site Request Forgery, Security Misconfiguration

Defacement

Defacement or cyber-defacement is when hackers illegally access a victim’s web server and alter the appearance of a website or webpage to suit their purpose.

Stolen data

Stolen data is information that is illegally obtained through unauthorised access to a system or network. This cyberattack incident is called data breach.

Types: Stolen information, Ransomware, Password guessing, Recording keystrokes, Phishing, Malware or virus, Denial of service

Session hijacking

Session hijacking is when cybercriminals have information on users’ session cookies and use it to take over their online transactions. Other terms for session hijacking are cookie hijacking and cookie side-jacking.

Types: Cross-site scripting (XSS), Session side jacking, Session fixation, Cookie theft by malware or direct access, Brute force

Malicious redirects

Malicious redirects are done by inserting a code into a website that effectively brings a visitor to another website. Attackers usually do this to increase impressions on their own websites or to run malicious web-based scripts on vulnerable devices of its visitors.

Types: Javascript insertions in your site’s files, Javascript inserted in pages or posts, Javascript redirects inserted into widgets, Obfuscated javascript appended to javascript files, Redirects inserted into htaccess files, Ad networks

SEO Spam

SEO Spam (aka Spamdexing) is a way of manipulating the relevance or ranking of search terms by spamming the search engine with keywords that will redirect traffic to a website designed by hackers as a scam.

Types: Spammy links, Spammy keywords, Spammy ads, Spammy posts and pages

Directory traversal

Directory Traversal (aka Path Traversal) is a cyberattack that attempts to gain access to restricted directories and files outside of the web root folder by taking advantage of vulnerabilities in the system.

Types: attacks that target vulnerabilities in the web server, attacks that target vulnerabilities in application code

Remote file inclusions

Remote File Inclusions (RFI) exploit insecurities in web applications linked to external scripts to insert malware from a remote URL. This results in stolen data, compromised web servers and website takeover.

Clickjacking

Clickjacking (aka UI Redress Attack) is a form of cyberattack that masks page elements using multiple layers to make them appear like a normal link or button that a user would click on. In effect, the attacker is able to hijack clicks or impressions meant for another page.

Types: Content overlays, Scrolling attacks, Rapid content replacement, Repositioning the trusted window, Phantom mouse cursors, Drag and drop attacks, 204 status codes/Malicious event handlers, Trusted dialogue extensions, Trusted user interfaces.