Cybersecurity Basic Terminology

Spear phishing

Spear phishing is special type of phishing  email or electronic communications scam targeted towards a specific individual, organization or business. These types of email are often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user’s computer. 

Credential stuffing: 

People tend to use same password in many platforms. For example many people have same password for gmail, social media, ebanking and other none essential website. Compromise of one of this platform might assist hacker to use same password on other platform to gain an access to sensitive data and information. 

Structured Threats

Structured threats are more focused by one or more individuals with higher-level skills actively working to compromise a system. The targeted system could have been detected through some random search process, or it might have been selected specifically. The attackers are typically knowledgeable about network designs, security, access procedures, and hacking tools, and they have the ability to create scripts or applications to further their objectives. Structured attacks are more likely to be motivated by greed, politics, international terrorism, and government-sponsored attacks.

Unstructured Threats

Unstructured threats often involve unfocused assaults on one or more network systems, often by individuals with limited or developing skills. The systems being attacked and infected are probably unknown to the perpetrator. These attacks are often the result of people with limited integrity and too much time on their hands. Malicious intent might or might not exist, but there is always indifference to the resulting damage caused to others.

Cryptomining

Cryptomining malware, or ‘cryptojacking,’ is a malware attack that compromise the target’s computing resources in order to mine cryptocurrencies like bitcoin. This malware uses a systems CPU and sometimes GPU to perform complex mathematical calculations that result in long alphanumeric strings called hashes.

Emotet

Emoted is a Trojan that is primarily spread through spam emails. The infection may arrive either via malicious script, macro-enabled document files, or malicious link. Emotet emails may contain familiar branding designed to look like a legitimate email. Emotet may try to persuade users to click the malicious files by using tempting language about “Your Invoice,” “Payment Details,” or possibly an upcoming shipment from well-known parcel companies.