Common Cyber Threats

Description:
Programs that are designed to attach themselves to other programs/files, and to multiply every time the host file is run.
Impact:
They can damage files, decrease computer performance and create a gateway for other malware infections.
History:
The first computer Virus was created in 1971 and was named the Creeper program.

Description:
Malware that can self-replicate, spreading copies of itself throughout a device or across a network.
Impact:
They are able to consume network bandwidth and system resources, which will lead to system failures.
History:
Created in 1988, named after the creator Morris Worm. It was created via a coding error resulting in the worm replicating itself on infected devices.

Description:
Disguised as a legitimate application, once they are opened they will perform malicious attacks.
Impact:
They are able to steal sensitive data (e.g. login credentials and credit card details), and encrypt data for a ransom.
History:
Created in 1975 by John Walker, it was given alongside a game called ANIMAL which was able to examine all computer directories available and make a copy.

Description:
Locks files or systems and demands a ransom (often Bitcoin) to return the files or device to a working state.
Impact:
Possible loss of files or system due to not paying the ransom, sensitive data being leaked to places such as the Dark Web.
History:
First appearing in 1989, the AIDS Trojan Virus was released via floppy disk at the World Health Organisation's AIDS conference. Payment was demanded to release the key.

Description:
A malicious software that is secretly used to gather information and monitor activity from the targeted device.
Impact:
Secretly spies on the target device's actions, and records actions such as keystrokes, browsing history and other forms of information.
History:
Its first significant impact was in 1999, when Elf Bowling, a free-to-play game, was discovered to have tracking software within it.

Description:
Software that is secretly installed, that displays unwanted pop-ups to disrupt the user.
Impact:
Decrease computer performance, installation of unwanted software and changes to browsers.
History:
From 1995 onwards a large amount of ad-supported software was labelled as spyware. Later down the line the less major types of software would be labelled as Adware.

Description:
A malicious software that is designed to allow hackers to have privileged access whilst remaining hidden.
Impact:
Bypass antivirus software to be able to install other malicious software, steal sensitive data and the possibility to use the infected device during a DDoS attack.
History:
Rootkits first appeared in the 1990s, but targeted Linux devices.

Description:
A form of spyware that records all key presses on a compromised system and sends them to another device.
Impact:
Sensitive data such as passwords, messages and financial information can be compromised.
History:
In the 1970s the Soviet Union developed the first keylogger named the 'Selectric Bug'; its goal was to spy on electric typewriters.

Description:
A collection of devices that have been infected by malicious software.
Impact:
They can be used to carry out malware attacks such as DDoS attacks.
History:
In 2004 the first Botnet called 'Bagle' was discovered. It was a Windows worm that relayed spam.

Description:
Malware that is specifically designed to attack Apple devices by exploiting weaknesses specifically on the platform.
Impact:
It is possible that data can be stolen, a decrease in system performance and possible for other malicious software to be installed.
History:
The Elk Cloner, which was first discovered in 1982 is seen to be the first form of Mac Malware. Its target was the Apple II computers and was spread via floppy disk. Elk Cloner was not seen as harmful due to it only displaying a poem on the targeted computers.

Cyber Defence Tools

Malware Scanner

Analyse suspicious files against 70+ antivirus engines to detect threats.

Launch Scanner

Password Checker

Calculate the entropy of your password to see how hard it is to crack.

Launch Checker