← Back|CYBERSECURITY›Section 1/16
0 of 16 completed

Common cyber attacks

Beginnerā± 13 min readšŸ“… Updated: 2026-02-17

Introduction

Every 39 seconds oru cyber attack nadakkudhu worldwide! 😱 2025 la India la mattum 15 lakh+ cyber crime cases report aachi.


Hackers epdhi attack pannuranga, enna type of attacks use pannuranga — idhellam therinjha dhaan namma defend panna mudiyum.


Indha article la common cyber attacks, real-world examples, and prevention techniques — ellam detailed ah paapom! šŸ›”ļø

Phishing Attacks šŸŽ£

Phishing = Fake messages/emails anuppi sensitive info steal pannuradhu.


Types of Phishing:


TypeDescriptionExample
**Email Phishing**Mass fake emails"Your SBI account suspended, click here"
**Spear Phishing**Targeted attack on specific personCEO ku fake vendor invoice
**Smishing**SMS phishing"KYC update pannunga" SMS with link
**Vishing**Voice call phishingFake bank call asking OTP
**Whaling**Targeting top executivesCFO ku urgent wire transfer request

How to identify:

  • Urgency create pannum — "Act NOW or account blocked!"
  • Spelling mistakes, weird email addresses
  • Suspicious links (hover panni paanga before clicking)
  • Asking for passwords, OTP, personal info

Malware — The Digital Virus 🦠

Malware = Malicious Software. Different types irukku:


🦠 Virus — Attaches to files, spreads when file opened

šŸ› Worm — Self-replicating, spreads through network automatically

🐓 Trojan — Looks legitimate but has hidden malicious code

šŸ”’ Ransomware — Encrypts files, demands ransom payment

šŸ‘ļø Spyware — Secretly monitors your activity

āŒØļø Keylogger — Records every keystroke (passwords capture)

šŸ¤– Botnet — Infected computers controlled remotely


Real Example: WannaCry Ransomware (2017)

  • 2,30,000+ computers in 150 countries affected
  • NHS hospitals in UK shut down
  • Demanded $300 Bitcoin ransom
  • Damage: $4 billion+ worldwide! šŸ’ø

Real Scenario: AIIMS Ransomware Attack

āœ… Example

šŸ„ November 2022 — AIIMS Delhi Ransomware Attack

India's premier hospital AIIMS Delhi got hit by ransomware:

- 40 million+ patient records compromised

- Hospital systems down for 2 weeks

- Doctors went back to pen and paper

- Hackers demanded ₹200 crore in crypto

- OPD, emergency, lab services — all affected

Impact: Patient care delayed, surgeries rescheduled, data at risk.

Lesson: Even critical infrastructure is vulnerable. Backups, segmentation, and security training — essential! šŸ›”ļø

DDoS Attacks 🌊

DDoS = Distributed Denial of Service


Imagine oru small chai shop ku suddenly 10,000 people varudhu. Shop handle panna mudiyaadhu, genuine customers ku service kedaikkaadhu. Same concept online la! ā˜•


How DDoS works:

  1. Hacker controls thousands of compromised computers (botnet)
  2. All computers simultaneously send requests to target server
  3. Server overwhelmed → crashes → legitimate users can't access

DDoS TypeLayerMethod
Volume-basedNetworkUDP flood, ICMP flood
ProtocolTransportSYN flood, Ping of Death
ApplicationApplicationHTTP flood, Slowloris

Real Example: GitHub (2018) — 1.35 Tbps DDoS attack, largest ever at that time. Mitigated within 10 minutes using Akamai! šŸ†

SQL Injection šŸ’‰

SQL Injection = Website database la unauthorized commands execute pannuradhu.


Oru login form la username field la instead of normal input:

code
Username: admin' OR '1'='1
Password: anything

Idhu database ku solludhu — "always true" → login without password! 😱


Prevention:

  • Input validation — user input sanitize pannunga
  • Parameterized queries use pannunga
  • ORM (Object Relational Mapping) use pannunga
  • Least privilege — database user ku minimum permissions

Impact: Yahoo (2013) — 3 billion accounts breached, partly through SQL injection! Largest data breach in history. šŸ“Š

Social Engineering šŸŽ­

Social Engineering = Technology attack illa — people ah manipulate pannuradhu.


Human psychology exploit pannuranga:


šŸŽ­ Pretexting — Fake identity create panni trust gain pannuradhu

"I'm from IT department, your password expired, tell me your current password"


šŸ¬ Baiting — Tempting offer through trap pannuradhu

Parking lot la "Salary Details" labeled USB drive pottu vaikka — curiosity la plug panniduvanga


šŸ”„ Quid Pro Quo — Something for something

"Free antivirus install pannren, just give me remote access"


🚪 Tailgating — Physically following authorized person into restricted area


Kevin Mitnick — world's most famous social engineer. FBI's most wanted hacker. His weapon? Not code — conversation! šŸ—£ļø

Man-in-the-Middle Attack šŸ•µļø

MITM = Hacker un communication middle la eavesdrop pannuradhu.


Nee ──▶ [HACKER] ──▶ Bank Website


Nee bank website ku data anuppuva. Hacker middle la intercept panni:

  • Un login credentials paappaan
  • Data modify pannuvaan
  • Fake responses anuppuvaan

Common scenarios:

  • Public WiFi (coffee shop, airport) — most vulnerable!
  • Fake WiFi hotspot — "Free_Airport_WiFi"
  • HTTP websites (no HTTPS)
  • Compromised routers

Prevention:

  • HTTPS websites mattum use pannunga šŸ”’
  • Public WiFi la VPN use pannunga
  • Free WiFi ah trust pannaadheenga
  • Certificate warnings ignore pannaadheenga

Attack Kill Chain

šŸ—ļø Architecture Diagram
ā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”
│            CYBER ATTACK KILL CHAIN                │
ā”œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”¤
│                                                   │
│  1. RECONNAISSANCE ──▶ Target info gathering      │
│         │                (social media, DNS)      │
│         ā–¼                                         │
│  2. WEAPONIZATION ──▶ Create attack payload       │
│         │                (malware, exploit)       │
│         ā–¼                                         │
│  3. DELIVERY ────────▶ Send to target             │
│         │                (email, USB, web)        │
│         ā–¼                                         │
│  4. EXPLOITATION ────▶ Trigger vulnerability      │
│         │                (code execution)         │
│         ā–¼                                         │
│  5. INSTALLATION ────▶ Install backdoor           │
│         │                (persistent access)      │
│         ā–¼                                         │
│  6. COMMAND & CTRL ──▶ Remote control             │
│         │                (C2 server)              │
│         ā–¼                                         │
│  7. ACTIONS ─────────▶ Achieve objective          │
│                          (data theft, damage)     │
│                                                   │
│  šŸ›”ļø DEFEND at EVERY stage to break the chain!   │
│                                                   │
ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜

Zero-Day & Advanced Attacks

Advanced attacks romba dangerous:


šŸ†˜ Zero-Day Attack

  • Software la unknown vulnerability exploit
  • Patch available aagura munnadhi attack
  • "Zero days" to fix — adhaan name
  • Very expensive in black market ($100K - $2.5M)

šŸ”— Supply Chain Attack

  • Software vendor ah compromise panni, updates through malware spread
  • SolarWinds (2020) — 18,000 organizations affected including US government!

šŸŽÆ APT (Advanced Persistent Threat)

  • Nation-state level hackers
  • Months/years target system la hidden ah iruppanga
  • Goal: Espionage, data theft, sabotage

šŸ’° Cryptojacking

  • Un computer secretly use panni cryptocurrency mine pannuradhu
  • Computer slow aagum, electricity bill increase aagum
  • Website visit panna kuda nadakkum (browser mining)

Prevention Best Practices

šŸ’” Tip

Ivanga follow pannunga — most attacks prevent pannalam:

šŸ” Authentication: Strong passwords + 2FA everywhere

šŸ“§ Email Safety: Unknown links click pannaadheenga, attachments open pannaadheenga

šŸ”„ Updates: OS, software, apps — immediately update pannunga

šŸ’¾ Backups: 3-2-1 rule — 3 copies, 2 different media, 1 offsite

🌐 Network: VPN use pannunga, public WiFi avoid pannunga

šŸ“š Awareness: Latest threats pathi read pannunga

šŸ” Verify: Unknown calls/emails la always verify the source

šŸ›”ļø Antivirus: Reputed antivirus install and update pannunga

Attack Comparison Table

All attacks oru comparison la:


AttackDifficultyImpactPrevention
PhishingEasyHighAwareness, 2FA
MalwareMediumHighAntivirus, Updates
DDoSMediumMediumCDN, Rate limiting
SQL InjectionMediumCriticalInput validation
Social EngineeringEasyHighTraining
MITMMediumHighHTTPS, VPN
Zero-DayHardCriticalPatch management
RansomwareMediumCriticalBackups, Segmentation

Key insight: Most successful attacks exploit human weakness, not technical weakness! 80% of breaches involve human element. 🧠

āœ… Summary & Key Takeaways

What we learned:


āœ… Phishing = Fake messages to steal credentials (most common!)

āœ… Malware = Virus, ransomware, trojan, spyware

āœ… DDoS = Overwhelming servers with fake traffic

āœ… SQL Injection = Attacking databases through web inputs

āœ… Social Engineering = Manipulating humans, not machines

āœ… MITM = Intercepting communications

āœ… Kill Chain = 7-step attack lifecycle


Key takeaway: 80% of attacks exploit human errors. Awareness is your strongest defense! 🧠


Next article: "IAM Basics" — Identity and Access Management, controlling who can access what! šŸ”‘

šŸ Mini Challenge

Challenge: Phishing Email Analysis Lab


Oru week time la phishing detection skills improve pannunga:


  1. Identify Phishing Emails — Namma spam folder la 10 emails paapom. Each email analyze pannunga: sender address check, suspicious links verify, grammar errors identify, urgency language detect.

  1. Wireshark MITM Demo — Kali Linux la Wireshark install pannunga. ARP spoofing lab follow pannunga (TryHackMe MITM room). Nee epdhi man-in-the-middle attack work panunga visualize pannunga.

  1. SQL Injection Practice — DVWA (Damn Vulnerable Web App) setup pannunga. SQL injection vulnerable login form la try pannunga (admin' OR '1'='1). Prevention techniques understand pannunga.

  1. Social Engineering Audit — Un organization la 5 people call pannunga (permission take panni). Pretexting scenario use pannunga. "I'm from IT, your password reset pannanum, current password sollanunga?" — how many fall for this? Results document pannunga.

  1. Malware Analysis Sandbox — Any malware sample (safe, isolated lab la) Wireshark + Process Monitor use panni analyze pannunga. Network traffic paappom, registry changes paappom, file system modifications paappom.

Indha challenge complete pannidha, nee attack patterns recognize panna master! šŸŽÆ

Interview Questions

Q1: What is the most common attack? How to prevent?

A: Phishing — 90% of breaches phishing through start aagudhu. Prevention: user awareness training, email filtering, 2FA, link verification.


Q2: Explain ransomware attack and recovery strategy.

A: Attacker data encrypt panni ransom demand pannum. Recovery: regular backups (3-2-1 rule), offline backups, segmentation, incident response plan. Ransom pay pannaadheenga — guarantee illa.


Q3: DDoS attack epdhi work panunga?

A: Thousands of compromised computers (botnet) server attack panni overwhelm pannunga. Server crash aagum, legitimate users access mudiyaadhu. Mitigation: rate limiting, CDN, DDoS protection service, traffic filtering.


Q4: SQL Injection vulnerability epdhi prevent pannuradhu?

A: Input validation (user input sanitize), parameterized queries, ORM usage, principle of least privilege (database user permissions limit), WAF (Web Application Firewall).


Q5: Social Engineering attack la company defend panna strategy?

A: Regular security awareness training, clear authentication procedures (verify requests), physical security controls, incident reporting culture (people comfortable reporting suspicious activity), executive-level security buy-in.

Frequently Asked Questions

ā“ Most common cyber attack enna?
Phishing — fake emails and messages through credentials steal pannuradhu. 90% of data breaches phishing la start aagudhu.
ā“ Ransomware attack la data recover panna mudiyum ah?
Backup iruntha recover pannalam. Illana very difficult. Ransom pay pannaadheenga — guarantee illa data return aagum nu.
ā“ DDoS attack na enna?
Distributed Denial of Service — oru server ku millions of fake requests anuppi crash pannuradhu. Website access mudiyaadha maari pannum.
ā“ Social engineering attack epdhi prevent pannuradhu?
Awareness dhaan best defense. Unknown calls/emails la sensitive info share pannaadheenga. Always verify the source.
🧠Knowledge Check
Quiz 1 of 2

WannaCry attack is an example of what type of malware?

0 of 2 answered