Cyberattack Knowledge Base  
First hacking technique to gain access to the company information?
image

Spear Phishing

The company's employees should see it as a red flag when anyone requests personal contact information. It's also a red flag if the sender's email comes from a suspicious or unfamiliar domain.

Hackers may impersonate the general manager to trick an employee into giving them access to the GM's account. This is known as spear phishing. Spear phishing is a targeted phishing attack aimed at a specific individual or group within an organisation.

Second hacking technique to gain access to the company information?
image

Social Engineering

A company employee should not trust a phone number they don't recognize. It's a red flag if the company's general manager is contacting them from a phone number registered in a country like Singapore.

Hackers use their skills to convince the employee that they are the real GM, in order to gain more information. In this case, the employee might reset the user’s password and provide a new one.

Social engineering relies on conversational techniques to trick targets (company employees) into revealing sensitive information or downloading malware.

Hackers attack type to request money form the company?
image

Ransomware

Paying hackers is not considered a good policy. Authorities generally advise against complying with ransomware demands.

Hackers use a malware file to encrypt all the data on the intranet and then demand money (a ransom) in exchange for restoring access to the data. They often request payment in Bitcoin, since blockchain-based currencies are less traceable than traditional forms of payment.

In IT, ransomware is a type of malware or malicious code that prevents the use of the infected device or system. The cybercriminal takes control of the compromised computer or network and "hijacks" it in various ways — such as encrypting files, locking the screen, or restricting access.

Hackers organisation name?
image

Black Hat Organisation

A Black Hat hacker is someone who engages in illegal and unethical activities, often with malicious intent. They exploit vulnerabilities in systems and networks to steal data, disrupt services, or cause harm — usually for personal or financial gain. Black Hat hackers are also known as "crackers."