ADVERTISEMENT
TechEconomy
Monday, May 12, 2025
No Result
View All Result
Advertisement
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
Podcast

Home » 8 Common Cyber Attacks You May Likely Experience

8 Common Cyber Attacks You May Likely Experience

Techeconomy by Techeconomy
August 11, 2022
in Security
6

RelatedPosts

CyberDome and Cato Networks

CyberDome and Cato Networks Collaborate to Deliver SASE in West Africa

May 12, 2025

Sophos Warns of Risk of Data Theft as Chinese Cars Flood France

May 7, 2025

A cyber-attack is a deliberate online invasion of a computer information system. It aims to steal private information on your device, for undue gain. People who engage in this act are called cyber criminals.

According to research carried out by cyber security firm: threat cloud, over 4 million attacks occur on a daily basis around the world. In this article, we will highlight and discuss common cyber attacks you may experience.

startups
United BANK
cyber cases

Attack 1: Malware

Malware or malicious software is a set of programs designed by cyber criminals to destroy computer systems, gain unauthorized access, and steal data from a system.

Malware can be classified into viruses, spyware, adware, worms, and Trojans. Let’s have a quick look at the types of malware:

Virus: A virus is a type of malware that causes harm to your computer system by slowing it down, and corrupting files.

Spyware: This refers to software that steals your private information, and sends it to a third party without your knowledge. Just like a spy, it’s hard to detect and transfers sensitive data to end users who can use it to defraud you.

Adware: Adware, also referred to as advertisement-supported software, displays unnecessary ads while you are surfing the internet. Adware is usually obtained when you unknowingly install a free app on your system that contains adware.

The ads popup so frequently that you can mistakenly click on them, and since some of them are laced with malicious links, you can mistakenly download a virus, without even knowing.

Worms: Once a worn finds its way into your device, it replicates itself with the aim to corrupt other computer systems. It is different from the virus as it doesn’t have to be attached to any software to cause damage. 

Trojan: Trojan is a malicious software program that seems legitimate, but when installed, causes damage and data loss to the computer system. The National Information Technology Development Agency (NITDA) has discovered two recent malware in Nigeria: ‘Flubot Spyware’ and ‘Saint Bot Malware’.

Flubot Spyware targets Android devices and sends fake security updates or app installations in the form of SMS. Unsuspecting Android users who install the spyware have their bank login details stolen which leads to financial loss.

Also, Flubot gains access to the contacts of such phones and sends similar SMS to them.

Saint Bot Malware is sent to the mail with a .zip file that masquerades as a Bitcoin wallet but in reality, it is a PowerShell script. Once the file is opened, malware is downloaded into the system. NITDA advises as a precaution you should always download software from the official website of the company offering it.

Attack 2: Phishing Attack

Phishing is a cyber-attack whereby scammers pose as a credible organization to collect personal information from you.

This cyber attack could be in the form of a text, email, or phone call. Phishers compose enticing messages that convince you to disclose your personal information. A phishing attack must be well thought out to ensure its success.

phishing crypto
Cryptocurrency (Phishing) scam – (Image time.com)

Planning a phishing attack usually involves the cybercriminal conducting social engineering on you, to profile you and find out what you are interested in. The phishing process is as follows:

  • Preparing the hook: preparing a fake website example a fake Facebook login page
  • Baiting: sending the fake login page to you via a link in an email, and urging you to act urgently
  • Redirecting: once you take the bait and try to login, your credentials are harvested by the cybercriminal and you are redirected to the original Facebook page, so you don’t suspect anything

Attack 3: Malvertising

Malvertising, also known as malware advertising, uses online advertising to spread malware to users of a website. The attackers create malicious ads with JavaScript embedded which makes it difficult to differentiate them from legitimate ads.

Such ads are displayed on your system like the real ones. They are usually composed in an enticing way to make you click on them. Investment scams are notorious for malvertising as cybercriminals pose as fund managers, stockbrokers and some even claim to be online forex brokers to lure you in with promises of trading on a mobile app with zero risk and huge returns.

The common scam ads is related to forex trading apps that promote in Nigeria without regulation.

There are only a few Tier-1 regulated brokers that offer their forex trading apps in Nigeria on mobile via iOS & Android. But many unregulated & offshore forex brokers promote their apps mostly via JavaScript ads on popular illegal websites visited by Nigerians, but these are unsafe for users.

While advertising is not bad, you should not take investment advice from random unsolicited popups.

United BANK

Endeavour to visit the Securities and Exchange Commission (SEC) website to verify any investment you come across online before committing your funds.

Attack 4: DDoS Attacks

A Distributed Denial of Service (DDoS) attack is an attempt to slow down a server or network by bombarding it with traffic. Simply put, DDoS prevents a server from attending to its users by overloading it with excessive data. When a server is too congested, it results in denial-of-service to the real users.

DDoS attacks are carried out with computers and devices that have been infected with malware. The hacker sends an instruction to these compromised systems and devices, also known as a botnet.

The botnet attacks a targeted IP address when instructed and causes the server to lag. The targeted network would be unable to serve its legitimate users. It is always difficult to separate the attack traffic from the legitimate traffic since the botnet is a real internet device.

Attack 5: Man in the Middle (MITM) Attacks

Man in the middle (MITM) attack is a cyber attack in which an attacker interrupts an existing conversation or data transfer. The attacker either eavesdrops or pretends to be a legitimate party, and steals private information from the victim.

A MITM attack undergoes two phases: interception and decryption. An attacker creates a Wi-Fi hotspot without a password and waits for victims to join the network.

Anyone who joins such a network grants the attacker access to any data they share online. This is known as an interception. This interception can be done via DNS, IP, and ARP spoofing.

Once the attacker gets in the ‘middle’ of the victim and his destination site, he steals the victim’s data. The victim’s data is usually encrypted, so he has to decode the data in order to use it (decryption). This decryption is done via HTTPS spoofing, SSL high jacking, & SSL spoofing.

cyber attacks
cyber attacks affect several systems

MITM attacks are done very quickly without the knowledge of the victim. The attackers use the data collected to defraud the victim, for example, wipe his bank account balance.

Attack 6: Drive by Download

Cybercriminals make use of this method to introduce further malware to their victim’s system. You may be unaware of the malicious download since you don’t have to download any program.

A drive-by download is unique because you don’t have to download any program or open any attachment for it to be activated. So how does drive-by download work?

The drive-by download takes advantage of unsecured and outdated apps, web browsers, and operating systems.  You can be attacked by drive-by download in two ways:

  • Authorization without complete information about an action: This happens when you either click a fake link or download a Trojan. You are ignorant about the consequences of such action thus, introducing drive-by download into your computer.
  • No authorization and notification: Drive-by download creeps into your computer or mobile device without notification due to an outdated web browser or browsing on an infected website.

Attack 7: Password Attacks

A password attack is an attempt by cybercriminals to steal your password. According to research by cloud nine, 80% of breaches are connected with password issues. 

Cybercriminals devise several techniques to steal legitimate passwords which include phishing, key logging, and dictionary password attacks among others.

Firstly, Key logging is a process in which a hacker records keystrokes made on your keyboard after he installs a key logger in your device. A key logger is malicious software that, when installed, captures your keystrokes and sends them to the hacker. A key logger can also be a hardware device connected to your USB port, so a routine inspection of your computer is in place. 

how to rest Facebook password

Secondly, dictionary password attacks are carried out by guessing words and phrases that a user would likely use as passwords. Hackers have software that use every word in the dictionary, combined with phrases and numbers, to predict your password.

Attack 8: Rogue Security Software

Rogue security software is a malware that deceives its victims to think that they have a virus on their computer and offers a solution in the form of antivirus.

Unsuspecting victims pay and download the antivirus software. The ‘antivirus’ introduces malware into the system.

Protect your PC/Mobile Device

  • Don’t open any attachments you are unsure of.
  • Your password should include letters, numbers, and special characters in upper and lower case.
  • Ensure that you update your apps and web browsers regularly.
  • Use an ad blocker.
  • Check email addresses to make sure they are from the right sources.
  • Use internet security software on your devices.
  • Add a password to your Wi-Fi hotspot.

Loading

Author

  • Techeconomy
    Techeconomy

    View all posts
0Shares

Tags: Cyber attacksFlubot SpywareMitMSMS
Previous Post

FG Deploys IoT, VPN to Monitor, Prevent Grid Collapse

Next Post

Aero Contractors adds Aircraft to its Fleet

Techeconomy

Techeconomy

Related Posts

CyberDome and Cato Networks
Security

CyberDome and Cato Networks Collaborate to Deliver SASE in West Africa

by Joan Aimuengheuwa
May 12, 2025
0

CyberDome, West Africa’s leading Managed Security Services Provider (MSSP), has announced collaboration with Cato Networks, the SASE leader, to deliver...

Read more
Sophos warning about Chinese Cars -

Sophos Warns of Risk of Data Theft as Chinese Cars Flood France

May 7, 2025
FG Launches Data Privacy Academy

Nigeria Virtual Privacy Academy: FG to Train Youth on Cybersecurity, Data Governance

May 7, 2025
Future of multi-cloud by Samson Aligba -

Securing the Future of AI Integration: Why an Enterprise-Grade Model Context Protocol Framework is Crucial

May 5, 2025
AI-Powered Cybercrime

Check Point: Exposing the Rise of AI-Powered Cybercrime, Defenses

May 5, 2025
World Passwords Day

Is it Time to Goodbye to Passwords?

May 2, 2025
Next Post

Aero Contractors adds Aircraft to its Fleet

Comments 6

  1. Pingback: 8 Widespread Cyber Assaults You Might Probably Expertise – TechEconomy.ng - Only Easy Tech
  2. Pingback: 8 Common Cyber Attacks You May Likely Experience – TechEconomy.ng – Mustafa.net
  3. Pingback: Effective Marketing Strategies For A Forex Trading Company – My Blog
  4. Pingback: 8 Common Cyber Attacks You May Likely Experience – TechEconomy.ng - Heal Security Inc
  5. Pingback: 8 Common Cyber Attacks You May Likely Experience – TechEconomy.ng – TechEconomy.ng – My Newsgator – Cyber Security
  6. Pingback: Spyware Dynamics in the African Regions Multidirectional, Enterprises Remain on Alert – TechEconomy.ng - Rvpg media

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Techeconomy Podcast

Techeconomy Podcast
Techeconomy Podcast

Infowave is brought to you by TechEconomy. Every week we will bring new stories from startups and influencers who are shaping and changing the world we live in. We’ll also bring you reports on topics you should know.

Follow us @techeconomyng for more.

CYBERSECURITY ESSENTIALS
byTecheconomy

BUILDING STRONGER NETWORKS AND COMMUNITIES

CYBERSECURITY ESSENTIALS
CYBERSECURITY ESSENTIALS
April 24, 2025
Techeconomy
Digital Marketing Trends and strategies for 2025 and beyond
February 27, 2025
Techeconomy
Major Lesson for Techies in 2024 and Projections for 2025
December 6, 2024
Techeconomy
Major Lessons for Techies in an AI-Driven World | Techeconomy Business Series Highlights
November 26, 2024
Techeconomy
Maximizing Profitability Through Seasonal Sales: Strategies For Success
November 8, 2024
Techeconomy
Techeconomy Business Series
October 15, 2024
Techeconomy
PRIVACY IN THE ERA OF AI: GETTING YOUR BUSINESS READY
May 30, 2024
Techeconomy
Unravel the Secrets of Marketing Everywhere All At Once with Isaac Akanni from Infobip | Infowave Podcast Episode 1
February 9, 2024
Techeconomy
The Role of Ed-tech in Life Long Learning and Continuous Education
October 19, 2023
Techeconomy
Filmmaking and Technology: A chat with Micheal Chineme Ike
June 7, 2023
Techeconomy
Search Results placeholder

WHAT IS TRENDING

https://www.youtube.com/watch?v=g_MCUwS2woc&list=PL6bbK-xx1KbIgX-IzYdqISXq1pUsuA4dz
uba

Follow Us

  • About Us
  • Contact Us
  • Careers
  • Privacy Policy

© 2025 Techeconomy - Designed by Opimedia.

No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS

© 2025 Techeconomy - Designed by Opimedia.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.