Cybersecurity incidents are becoming more frequent and consequences more severe. In order to safeguard your business from an attack, first, you must understand the tools and methods cybercriminals use to orchestrate these attacks. One of the key concepts to understand is what an attack vector is and what are the most common attack vectors.
The cybersecurity threat landscape is ever-changing, so we’ve compiled a list of the 11 most common attack vectors to watch out for in 2021.
1) WHAT IS AN ATTACK VECTOR?
An attack vector is a way in which a cybercriminal gains unauthorised access to a network or computer to carry out malicious activities.
Once a hacker uses an attack vector to enter a network or computer they can then access confidential information on a business or individuals or infect the system with malicious programs.
Phishing is the most common attack vector and has been for many years. Phishing is where a cybercriminal contacts a target by email, telephone or SMS posing as a legitimate individual, or business to deceive the victim into clicking a malicious link or providing sensitive information, such as passwords or payment card information.
3) LACK OF ENCRYPTION
Whenever sensitive data is transferred it should be encrypted to ensure that even if it is intercepted it cannot be read without the encryption key. Many businesses still use unencrypted FTP sessions to transfer data, meaning that if a hacker intercepts the data, it is in plain text.
It should also be noted that not all encryption is created equally, low-level encryption is safer than no encryption at all, however, strong SSL/TLS encryption is favoured as it is significantly more difficult to obtain the encryption key.
4) COMPROMISED OR WEAK CREDENTIALS
Compromised credentials is when a cybercriminal gains access to a network or system by obtaining the user credentials, such as a username and password. These credentials are often obtained through a phishing attack or poor password hygiene. Similarly, having weak credentials, such as a common password, allows cyber criminals easy access to a supposedly secure network.
5) MALICIOUS INSIDERS
When considering potential attack vectors, one that is often ignored is that of malicious insiders. These are individuals who are current or former employees that have legitimate access to company data and use this access with carry out malicious activities. This threat can be difficult to detect as employees need access to networks and data to do their jobs, however, there are policies that can be put in place to reduce this risk.
6) DISTRIBUTED DENIAL OF SERVICE
Distributed Denial of Service or DDOS is a malicious attack where a cybercriminal overwhelms a target server, service or network with internet traffic to disrupt normal traffic. The goal of these attacks may be to stop legitimate traffic from visiting a site, or to overwhelm network equipment, such as firewalls, in order to launch another cyberattack.
Misconfiguration is when a system is not configured correctly. This may include leaving the default username and password when configuring a device or in a setup page. This also includes not updating software when there are security patches and leaving unused features on a device enabled. This is particularly common with networking devices and database setups.
Malware is one of the oldest forms of attack vector, first originating in the 1980s. Malware is any software that is intentionally designed to cause damage to a computer, server, or network. This includes viruses, ransomware and trojan horses. Malware is often distributed through malicious emails, websites and advertising.
Malvertising is a relatively new method of spreading malware, including ransomware. This attack vector is where a cybercriminal pays for legitimate advertising space on search engines and social networking platforms, but the website that is being advertising contains malware that when downloaded will infect the victim’s computer or network.
10) BRUTE FORCE
A brute force attack is when a cybercriminal finds the correct login credentials to a secure device, account or network by submitting many passwords until they find the correct one. A hacker uses a program to do this which can submit 1000s of login attempts per second. This attack vector is easy to negate with long, complex passwords that utilise numbers and special characters.
A man-in-the-middle attack may include intercepting messages and emails between individuals that includes sensitive data, or intercepting login credentials between a user and an IT system. There are many different methods that can be used to carry out a man-in-the-middle attack, however, most of these can be avoided with firewalls, encryption, multi-factor authentication and strong security culture within an organisation.
HOW WE CAN HELP YOU
These are the eleven most common attack vectors, and some basic knowledge of each may help with noticing an attack attempt before it becomes a cybersecurity incident. However, for each of these eleven attack vectors there are multiple methods of execution for different purposes and each year they become more advanced.
It can be difficult to stay up to date with each new method and the best practice for avoiding an attack, so if you need help deploying a comprehensive cybersecurity solution to keep your business and its data safe, contact us today.