Common Cyber Threats

Cryptomining

Cryptocurrency mining (cryptomining) uses the processing power of computers to solve complex mathematical problems and verify cybercurrency transactions, and the miners are then rewarded with a small amount of cybercurrency.

Data spill

Sometimes personal information is released to unauthorised people by accident or as the result of a security breach. For example, an email with personal information can be sent to the wrong person, or a computer system can be hacked and personal information stolen. These are known as a data breaches or data spills.

Denial of Service

A distributed denial of service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic.

Hacking

Hacking refers to unauthorised access of a system or network, often to exploit a system’s data or manipulate its normal behaviour.

Identity theft

Identity theft is when a cybercriminal gains access to your personal information to steal money or gain other benefits. They can create fake identity documents in your name, get loans and benefits or apply for real identity documents in your name, but with another person's photograph.

Phishing - scam emails

Phishing is a way that cybercriminals steal confidential information, such as online banking logins, credit card details, business login credentials or passwords/passphrases, by sending fraudulent messages (sometimes called ‘lures’).

Ransomware

Ransomware attacks are on the rise. Learn how to protect yourself against it and secure your devices.


Copyright @2023 ZAMBIA CIRT