Skip to content

Next Bootcamp Edition
May 4th, 2026

Cyber Attack

A deliberate attempt by malicious actors to breach, disrupt, or damage computer systems, networks, or data, ranging from phishing and malware infections to sophisticated nation-state operations targeting critical infrastructure.

Author
Unihackers Team
Reading time
7 min read
Last updated

Why It Matters

Cyber attacks have become one of the defining challenges of the digital age. Every organization—from small businesses to multinational corporations, from hospitals to power grids—faces a constant barrage of attempted intrusions. Understanding the landscape of cyber threats is essential for anyone working in technology or cybersecurity.

The stakes have never been higher. Cyber attacks cause hundreds of billions of dollars in annual damages globally. Beyond financial losses, attacks disrupt critical services, compromise personal privacy, enable fraud and theft, and in some cases, threaten national security. The Colonial Pipeline ransomware attack disrupted fuel supply across the eastern United States. Hospital attacks have been linked to patient deaths. Nation-state operations have compromised government agencies and defense contractors.

The attack surface continues to expand. Cloud adoption, remote work, IoT devices, and interconnected supply chains create new opportunities for attackers. Meanwhile, the barrier to entry for cybercrime has dropped dramatically—sophisticated attack tools are available for purchase or rent, enabling less skilled criminals to launch devastating attacks.

For cybersecurity professionals, understanding how attacks work is the foundation of effective defense. Whether you're analyzing threats, building defenses, or responding to incidents, you need to understand the attacker's perspective.

Categories of Cyber Attacks

Cyber attacks can be classified by their method, target, or objective. Understanding these categories helps defenders prioritize protections and recognize threats.

By Attack Vector

Social Engineering: Manipulating humans to gain access or information. Phishing and social engineering remain the most common initial access vectors.

Network-Based: Exploiting vulnerabilities in network protocols, services, or configurations to gain unauthorized access or disrupt operations.

Application-Layer: Targeting vulnerabilities in web applications, APIs, or software to steal data or gain system access.

Supply Chain: Compromising trusted software, hardware, or service providers to reach downstream targets.

Physical: Gaining physical access to systems, installing rogue devices, or stealing hardware.

By Attacker Motivation

MotivationDescriptionExamples
FinancialProfit through theft, fraud, or extortionRansomware, banking trojans, BEC
EspionageStealing secrets, intelligence, or IPNation-state APTs, corporate espionage
HacktivismIdeological or political motivationWebsite defacements, DDoS protests
DestructionCausing damage or disruptionWipers, sabotage attacks
Script KiddiesTesting skills, seeking notorietyOpportunistic attacks, defacements

Types of Cyber Attacks

Social Engineering Attacks

Social engineering exploits human psychology rather than technical vulnerabilities. These attacks remain the most successful because they bypass technical controls entirely.

Phishing: Fraudulent emails, messages, or websites designed to steal credentials or deliver malware. Variants include spear phishing (targeted), whaling (executives), and smishing (SMS).

phishing-indicators.txt
Text

Common Phishing Indicators:
- Urgency or threats requiring immediate action
- Sender address doesn't match claimed organization
- Generic greetings ("Dear Customer" vs. your name)
- Links to unfamiliar or misspelled domains
- Requests for credentials or sensitive information
- Unexpected attachments
- Poor grammar (though AI has improved attack quality)

Pretexting: Creating a fabricated scenario to manipulate victims. Attackers might impersonate IT support, executives, or vendors to request information or access.

Baiting: Leaving infected USB drives or offering attractive downloads to entice victims into compromising their systems.

Malware Attacks

Malware encompasses all malicious software designed to harm systems or steal data.

Ransomware: Encrypts victim files and demands payment for recovery. Modern variants combine encryption with data theft (double extortion) and threaten to publish stolen data.

Trojans: Malware disguised as legitimate software. Once installed, trojans provide backdoor access, steal credentials, or download additional malware.

Spyware: Software that secretly monitors user activity, capturing keystrokes, screenshots, and sensitive information.

Rootkits: Malware designed to hide its presence and maintain persistent, privileged access to systems.

Worms: Self-propagating malware that spreads across networks without user interaction.

Network Attacks

DDoS Attacks: Distributed Denial of Service attacks flood targets with traffic from multiple sources, overwhelming capacity and causing outages. Attack types include volumetric (bandwidth exhaustion), protocol (resource exhaustion), and application-layer (request flooding).

Man-in-the-Middle: Attackers position themselves between two parties to intercept, modify, or steal communications. Common in unsecured networks and attacks against weak encryption.

DNS Attacks: Compromising DNS infrastructure to redirect traffic, including DNS spoofing, cache poisoning, and DNS amplification for DDoS.

Network Sniffing: Capturing network traffic to steal credentials, session tokens, or sensitive data transmitted without encryption.

Application Attacks

SQL Injection: Inserting malicious SQL code through user inputs to access or modify database contents. Still common despite being well-understood.

sql-injection-example.txt
SQL

-- Vulnerable login query
SELECT * FROM users WHERE username = 'input' AND password = 'input'

-- Malicious input: admin'--
SELECT * FROM users WHERE username = 'admin'--' AND password = ''
-- The -- comments out the password check, granting unauthorized access

Cross-Site Scripting (XSS): Injecting malicious scripts into web pages viewed by other users, enabling session hijacking, defacement, or malware delivery.

Zero-Day Exploits: Attacks exploiting previously unknown vulnerabilities before patches are available. Highly valuable to attackers and nation-states.

API Attacks: Targeting exposed APIs through authentication bypass, injection attacks, or excessive data exposure.

Credential Attacks

Brute Force: Systematically trying password combinations until finding the correct one. Effective against weak passwords without account lockout.

Credential Stuffing: Using stolen username/password pairs from data breaches to access accounts where users reused passwords.

Password Spraying: Trying common passwords across many accounts simultaneously to avoid lockout thresholds.

Kerberoasting: Extracting and cracking service account password hashes from Active Directory environments.

Advanced Persistent Threats (APTs)

APTs are sophisticated, long-term attack campaigns typically conducted by nation-states or well-funded criminal organizations.

apt-lifecycle.txt
Text

APT Attack Lifecycle:

1. Reconnaissance
 - Research target organization
 - Identify employees, technologies, vendors
 - Map attack surface

2. Initial Compromise
 - Spear phishing key employees
 - Exploit internet-facing vulnerability
 - Compromise trusted supplier

3. Establish Foothold
 - Install persistent backdoors
 - Create privileged accounts
 - Disable security logging

4. Internal Reconnaissance
 - Map internal network
 - Identify sensitive data locations
 - Locate domain controllers

5. Lateral Movement
 - Compromise additional systems
 - Escalate privileges
 - Access crown jewels

6. Data Exfiltration / Mission Completion
 - Extract target data
 - Maintain access for future operations
 - Cover tracks

The Attack Kill Chain

Understanding how attacks unfold helps defenders identify and disrupt threats at each stage.

Kill Chain Stages

StageAttacker ActivityDefender Opportunity
ReconnaissanceResearch targets, scan for vulnerabilitiesReduce exposed information, monitor for scanning
WeaponizationCreate malicious payloadsThreat intelligence on known tools
DeliverySend phishing, exploit vulnerabilitiesEmail filtering, patching, web filtering
ExploitationExecute malicious codeEndpoint protection, application hardening
InstallationInstall persistence mechanismsHost-based detection, integrity monitoring
Command & ControlEstablish communication channelNetwork monitoring, DNS filtering
Actions on ObjectivesSteal data, deploy ransomware, cause damageData loss prevention, segmentation

Defense Strategies

Defense in Depth

No single control stops all attacks. Effective defense requires multiple layers:

Perimeter Security: Firewalls, web application firewalls, email gateways, and DDoS protection.

Network Security: Segmentation, intrusion detection (IDS/IPS), encrypted communications (VPN).

Endpoint Security: Antivirus, Endpoint Detection and Response (EDR), application control, patching.

Identity Security: Strong authentication (MFA), privileged access management, zero trust architecture.

Data Security: Encryption, data loss prevention, backup and recovery.

Human Security: Security awareness training, phishing simulations, clear security policies.

Detection and Response

Prevention eventually fails. Organizations must also detect and respond to attacks:

Security Monitoring: SIEM platforms aggregate logs and detect anomalies. SOC analysts investigate alerts.

Threat Intelligence: Understanding attacker tactics, techniques, and procedures (TTPs) improves detection.

Incident Response: Documented plans and practiced procedures for containing and recovering from attacks.

Threat Hunting: Proactively searching for undetected threats rather than waiting for alerts.

defense-priorities.txt
Text

Defense Priority Matrix:

High Impact, High Likelihood:
- [x] Multi-factor authentication everywhere
- [x] Endpoint detection and response
- [x] Email security and phishing protection
- [x] Patch management for critical vulnerabilities
- [x] Backup and recovery (including offline)

High Impact, Lower Likelihood:
- [ ] Network segmentation
- [ ] Zero trust architecture
- [ ] Privileged access management
- [ ] Security awareness program

Foundation Requirements:
- [ ] Asset inventory
- [ ] Security monitoring and logging
- [ ] Incident response planning
- [ ] Vulnerability management

Career Connection

Understanding cyber attacks is fundamental to virtually every cybersecurity role. SOC analysts detect and investigate attacks. Incident responders contain and recover from breaches. Penetration testers simulate attacks to find weaknesses. Security engineers build defenses. Threat intelligence analysts track attacker groups and methods.

Cyber Attack Defense Roles (US Market)

RoleEntry LevelMid LevelSenior
SOC Analyst$55,000$75,000$100,000
Incident Responder$75,000$105,000$140,000
Threat Intelligence Analyst$80,000$110,000$145,000
Penetration Tester$85,000$115,000$155,000

Source: CyberSeek

In the Bootcamp

How We Teach Cyber Attack

In our Cybersecurity Bootcamp, you won't just learn about Cyber Attack in theory. You'll practice with real tools in hands-on labs, guided by industry professionals who use these concepts daily.

Covered in:

Module 1: Cybersecurity Foundations

Related topics you'll master:CIA TriadThreat VectorsNIST FrameworkISO 27001
See How We Teach This

360+ hours of expert-led training • 94% employment rate