Types of Cyberattack, Specific Risks and How to Mitigate those Risks
Please note that the list of cyberattack types is distributed by the Canadian Centre for Cyber Security and the means to mitigate is provided by third parties. This information is not meant to be exhaustive and Skyway West is not responsible for omissions or mistakes.
What is a Malware Vulnerability, what is the risk and how can you mitigate that risk?
What is it? Malware is any “malicious software.” Malware can steal, encrypt, or delete your data, alter or hijack core computer functions, and spy on your computer activity without your knowledge or permission. Most modern malware contains advanced capabilities that help it spread, avoid detection or be very difficult to remove. Why is it a risk? A Denial ...What is the Rsync (remote synchronization) Vulnerability, what is the risk and how can you mitigate that risk?
What is it? Rsync (remote synchronization) has been used for over two decades to move and mirror file systems between computers on a network; it is often used for maintaining a backup because it only transfers differences between the two systems; it’s very efficient. The Wikipedia entry for rsync linked below provides an excellent overview ...What is the Building Automation and Control Network (BACnet) Vulnerability, what is the risk and how can you mitigate that risk?
What is it? Building Automation and Control Network (BACnet) is a common building automation system protocol that offers Alarm and event monitoring, remote device management and computer file and terminal access. The default port for BACnet traffic is 47808 Why is it a risk? Because early building automation systems relied on dedicated wiring and networks, there were ...What is the MQTT Vulnerability, what is the risk and how can you mitigate that risk?
What is it? MQTT (which originally was an acronym for Message Queue Telemetry Transport, but since 2013 doesn’t actually stand for anything according to Wikipedia) is a protocol use for remote sensor and control (the Internet of Things – IoT); particulraly for industrial applications. MQTT operates unencrypted on port 1883 or encrypted on port 8883. Why is ...What is the MS-SQL Server Resolution Service Vulnerability, what is the risk and how can you mitigate that risk?
What is it? MS-SQL Server Resolution Service (MC-SQLR) facilitates connections over the Internet to MS SQL database servers. Why is it a risk? A Denial of Service attack (DoS) is when an attacker attempts to overwhelm a victim’s server. A Distributed Denial of Service (DDoS) attack is when the attacker uses many unwitting accomplice computers to attack their victim. ...What is the Microsoft Exchange Server Memory Handling Vulnerability, what is the risk and how can you mitigate that risk?
Microsoft Exchange Server (2010, 2013, 2016 and 2019… various updates) has a memory handling vulnerability that allows an attacker to execute an operating system command remotely.What is the Microsoft Exchange Server Vulnerability, what is the risk and how can you mitigate that risk?
Microsoft Exchange Server (2013, 2016 and 2019) has a vulnerability that allows an attacker to write an arbitrary file and execute it remotely. An error in the software allows senders to bypass authentication, install programs and run them.What is the Zimbra Collaboration Suite Vulnerability, what is the risk and how can you mitigate that risk?
Zimbra Collaboration Suite (ZCS) has the ability to import messages that contain ZIP archives and will automatically unarchive the contents. An error in the software allows senders to bypass all authentication, install programs and run them.What is a Connectionless LDAP Service Vulnerability, what is the risk and how can you mitigate that risk?
What is it? Lightweight Directory Access Protocol (LDAP) allows remote users to lookup directory data. An LDAP Directory usually contains information about users, but may also contain data about printers, servers, conference rooms, other equipment, etc. LDAP is the protocol used to access the proprietary Microsoft Active Directory. Although LDAP is not Active Directory specific, ...What is the Internet Key Exchange Vulnerability, what is the risk and how can you mitigate that risk?
What is it? Internet Key Exchange (IKE) is security protocol used by various Cisco brand devices, all Microsoft servers and some Linux/UNIX servers. IKE has two versions. Devices use IKE to send each other keys that positively identify each party before they begin data transfer. Internet Protocol Security (IPSec) uses IKE; IPSec is ...What is the AFP Vulnerability, what is the risk and how can you mitigate that risk?
What is it? Apple Filing Protocol (AFP) allows Apple OSX computers to share files across a network. This can be handy (and easy) when used in small, trusted networks. Why is it a risk? When your Apple OSX Server is connected to the Internet, enabling AFP may unintentionally expose your server’s files to the world. ...What is the Enforced CredSSP Vulnerability, what is the risk and how can you mitigate that risk?
What is it? Remote Desktop Protocol (RDP) allows a remote computer to take control of a computer in your network. RDP comes pre-installed for Microsoft Windows but can also be used with Apple OSX computers. RDP is used by many to work-from-home; it’s also used by IT support departments to perform remote maintenance and ...