What is the term for someone who attempts to steal information from a computer?

Definition: Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.

Description: To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.

Insider threats are users who have authorized and legitimate access to a company's assets and abuse them either deliberately or accidentally. They include:

  • Employees careless of security policies and procedures
  • Disgruntled current or former employees
  • Business partners, clients, contractors or suppliers with system access

Insider threats


What do cyberattackers target?

Cyberattacks happen because organizations, state actors or private persons want one or many things, like:

  • Business financial data
  • Clients lists
  • Customer financial data
  • Customer databases, including personally identifiable information (PII)
  • Email addresses and login credentials
  • Intellectual property, like trade secrets or product designs
  • IT infrastructure access
  • IT services, to accept financial payments
  • Sensitive personal data
  • US government departments and government agencies


What are common types of cyberattacks?

In the current, connected digital landscape, cybercriminals use sophisticated tools to launch cyberattacks against enterprises. Their attack targets include personal computers, computer networks, IT infrastructure and IT systems. And some common types of cyberattacks are:

Backdoor Trojan

A backdoor Trojan creates a backdoor vulnerability in the victim's system, allowing the attacker to gain remote, and almost total, control. Frequently used to link up a group of victims' computers into a botnet or zombie network, attackers can use the Trojan for other cybercrimes.

Cross-site scripting (XSS) attack

XSS attacks insert malicious code into a legitimate website or application script to get a user's information, often using third-party web resources. Attackers frequently use JavaScript for XSS attacks, but Microsoft VCScript, ActiveX and Adobe Flash can be used, too.

Denial-of-service (DoS)

DoS and Distributed denial-of-service (DDoS) attacks flood a system's resources, overwhelming them and preventing responses to service requests, which reduces the system's ability to perform. Often, this attack is a setup for another attack.

DNS tunneling

Cybercriminals use DNS tunneling, a transactional protocol, to exchange application data, like extract data silently or establish a communication channel with an unknown server, such as a command and control (C&C) exchange.

Malware

Malware is malicious software that can render infected systems inoperable. Most malware variants destroy data by deleting or wiping files critical to the operating system's ability to run.

Read the 2022 Threat Intelligence Index on Malware

Phishing

Phishing scams attempt to steal users' credentials or sensitive data like credit card numbers. In this case, scammers send users emails or text messages designed to look as though they're coming from a legitimate source, using fake hyperlinks.

Ransomware

Ransomware is sophisticated malware that takes advantage of system weaknesses, using strong encryption to hold data or system functionality hostage. Cybercriminals use ransomware to demand payment in exchange for releasing the system. A recent development with ransomware is the add-on of extortion tactics.

See the Threat Intelligence Index for more

SQL injection

Structured Query Language (SQL) injection attacks embed malicious code in vulnerable applications, yielding backend database query results and performing commands or similar actions that the user didn't request.

Zero-day exploit

Zero-day exploit attacks take advantage of unknown hardware and software weaknesses. These vulnerabilities can exist for days, months or years before developers learn about the flaws.


What can cyberattacks do?

If successful, cyberattacks can damage enterprises. They can cause valuable downtime, data loss or manipulation, and money loss through ransoms. Further, downtime can lead to major service interruptions and financial losses. For example:

  • DoS, DDoS and malware attacks can cause system or server crashes.
  • DNS tunneling and SQL injection attacks can alter, delete, insert or steal data into a system.
  • Phishing and zero-day exploit attacks allow attackers entry into a system to cause damage or steal valuable information.
  • Ransomware attacks can disable a system until the company pays the attacker a ransom.

As an illustration, DarkSide, a ransomware gang, attacked Colonial Pipeline, a large US refined products pipeline system, on April 29, 2021. Through a virtual private network (VPN) and a compromised password (link resides outside of ibm.com), this pipeline cyberattack gained entry into the company's networks and disrupted pipeline operations. In effect, DarkSide shut down the pipeline that carries 45% of the gas, diesel and jet fuel supplied to the US east coast. They soon followed their shutdown with a ransom note, demanding almost USD 5 million in Bitcoin cryptocurrency, which Colonial Pipeline's CEO paid (link resides outside of ibm.com).

After all, Colonial Pipeline hired a third-party cybersecurity firm and informed federal agencies and US law enforcement. USD 2.3 million of the ransom paid was recovered.

Read more: Shedding Light on the DarkSide Ransomware AttackExplore unified endpoint management solutions


How cyberattacks can be reduced

Organizations can reduce cyberattacks with an effective cybersecurity system. Cybersecurity is the practice of protecting critical systems and sensitive information from digital attacks, involving technology, people and processes. An effective cybersecurity system prevents, detects and reports cyberattacks using key cybersecurity technologies and best practices, including:

  • Identity and access management (IAM)
  • A comprehensive data security platform
  • Security information and event management (SIEM)
  • Offensive and defensive security services and threat intelligence

Prevent cyberattacks

A threat management strategy identifies and protects an organization's most important assets and resources, including physical security controls for developing and implementing appropriate safeguards and protecting critical infrastructure.

Detect cyberattacks

The threat management system provides measures that alert an organization to cyberattacks through continuous security monitoring and early detection processes.

Report cyberattacks

This process involves ensuring an appropriate response to cyberattacks and other cybersecurity events. Categories include response planning, communications, analysis, mitigation and improvements.


Why is cybersecurity important?

Cybercrime can disrupt and damage enterprise business. In 2021, for example, the average cost of a data breach was USD 4.24 million globally and USD 9.05 million in the United States. These costs include discovering and responding to the violation, the cost of downtime and lost revenue, and the long-term reputational damage to a business and its brand. And in the case of compromised PII, it can lead to a loss of customer trust, regulatory fines, and even legal action.

What are the 3 types of hackers?

Hackers fall into three general categories: black hat hackers, white hat hackers, and gray hat hackers. Although hackers are often associated with exploiting vulnerabilities to gain unauthorized access to computers, systems, or networks, not all hacking is malicious or illegal.

What is a hacker in computer terms?

A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorized access to systems or networks in order to commit crimes.

What is a malicious hacker called?

Black hat hackers are malicious hackers, sometimes called crackers. Black hats lack ethics, sometimes violate laws, and break into computer systems with malicious intent, and they may violate the confidentiality, integrity, or availability of an organization's systems and data.

What are cyber attackers called?

People who carry out cyber attacks are generally regarded as cybercriminals. Often referred to as bad actors, threat actors and hackers, they include individuals who act alone, drawing on their computer skills to design and execute malicious attacks.