CYBERTHREATS
CYBERTHREATS
01/ 30
THREATS
PRESENTED BY
ALIZA VAHIDY 24L-3033
FATIMA ASIF 24L-3075
SYED SAAD ALI 24L-2549
ABDULLAH RASHEED 24L-3002
MUHAMMAD HUZAIFA 24L-3019
WHAT ARE 02/ 30
CYBER THREATS
Cyberthreats are dangers or
harmful activities that happen
online using computers, the
internet, or other digital devices.
These threats aim to steal
information, damage systems,
or disrupt normal operations.
03/ 30
09/ 15
❑ Phishing Emails:
Fake emails pretending to be from
your bank or a friend, asking you to
EXAMPLES OF
click a link or share personal details.
❑ Viruses and Malware:
Harmful programs that can slow
CYBERTHREATS
down your computer, delete files, or
spy on your activities.
❑ Hacking:
When someone breaks into your
IN DAILY LIFE
social media, email, or online accounts
without your permission.
❑ Scams:
Fake messages about winning prizes
or free offers that trick people into
giving money or personal information.
WHY IT MATTERS
04/ 15
For example,
❑ losing your social media account can
feel frustrating,
❑ but losing important data or money can
be even worse.
❑ That's why it's important to use strong
passwords, avoid clicking on
suspicious links, and install antivirus
software.
FUNFACTS 06/ 15
TYPES OF
CYBERTHREATS
MALWARE
PHISHING
RANSOMWARE
DDOS ATTACK
MALWARE
04/ 15
What is Malware?
Definition of Malware:
Malware (short for "malicious
software") refers to any program or file
created to harm, exploit, or compromise
a computer system or network, often
designed to steal data or cause damage.
Common Types of 05/ 15
MALWARE Adware:
Software that automatically
displays or downloads unwanted
advertisements, often leading to a
slower system and potential
exposure to further threats.
Viruses:
Self-replicating programs that
attach themselves to files and Spyware:
spread to other systems or Programs that secretly monitor
files when executed. and collect personal data, such as
browsing history or login
credentials, without the user's
consent.
Worms:
Standalone programs that
spread across networks without
needing a host file, often
exploiting system
vulnerabilities.
Spyware Attack on Government 04/ 15
❑ Attack Overview:
In 2020, a spyware attack targeted multiple high-ranking government officials in
Pakistan.
❑ Attack Method:
The attackers used spear-phishing emails that contained malicious attachments or links.
Once opened, the spyware was installed on the devices, giving attackers access to
sensitive information and communications.
❑ Impact:
The spyware allowed attackers to monitor private communications, track activities, and
exhilarate data.
❑ Targeted Individuals:
The attack specifically targeted officials involved in national security and foreign
relations, increasing the severity of the breach.
Protection AGAINST MALWARE 06/ 15
What is Phishing?
● Definition:
○ A cyberattack where malicious actors
deceive individuals into sharing sensitive
data.
○ Methods include emails, text messages,
websites, or phone calls impersonating
legitimate organizations.
EXAMPLES OF PHISHING 05/ 15
A
VERY
FAMILIAR
EXAMPLE
08/ 15
ANOTHER
ONE
08/ 15
CASESTUDIES 10/ 15
01 03
02
Target Data Breach (2013): Crelan Bank CEO
○ Attack via third-party vendor; Google and Facebook Fraud (2016):
40M card details stolen. Scam (2013–2015): ○ €70M lost due to fake
○ Lesson: Secure third-party ○ $121M lost via fake CEO emails.
network access. invoices. ○ Lesson: Verify large
○ Lesson: Verify payment transactions
requests strictly.
PHISHING PREVENTION TOOLS 12/ 15
❑ Norton 360:
❑ Avast Secure Browser:
❑ Google Safe Browsing:
❑ McAfee Mobile Security:
❑ Kaspersky Internet Security:
❑ Bitdefender Mobile Security:
❑ Email Security Tools for Businesses:
❑ Microsoft Defender:
❑ LastPass/Dashlane:
❑ Truecaller:
❑ PakCERT Tools
10/ 15
Definition:
RANSOMWARE
Ransomware is a type of malicious software designed to encrypt
files on a victim's device, rendering them inaccessible until a
ransom is paid to the attacker. Attackers often threaten to leak or
permanently delete the data if the ransom is not paid.
Examples:
❑ WannaCry (2017): Exploited a vulnerability in
Windows OS, affecting over 200,000 computers across
150 countries.
❑ DarkSide (2021): Targeted Colonial Pipeline, leading
to fuel supply disruptions in the U.S.
09/ 15
Crypto Ransomware:
Encrypts valuable files, making them
inaccessible without a decryption key.
RANSOMWARE
Locks the user out of the operating system,
preventing access to the entire system.
Definition:
Banking frauds involve illegal activities aimed at unlawfully obtaining
money, assets, or other property owned or held by a financial institution.
Recent Research:
A 2022 scoping review emphasizes the importance of
robust fraud detection and prevention frameworks in
financial institutions
08/ 15
PREVENTION
STRATEGIES
❑Regular Backups
❑Security Software
❑Employee Training
❑Patch Management
❑ Multi-Factor Authentication
(MFA)
❑ Fraud Detection Systems
❑ Customer Education
❑ Regulatory Compliance
DDOS ATTACKS
11/ 15
DEFINITION
A Distributed Denial of
Service (DDoS) attack
overwhelms a server or
website with excessive IMPACT
requests, causing it to
malfunction or go offline,
Even if the website doesn’t go
impacting its ability to serve
completely offline,
legitimate users.
performance can drastically
degrade, causing slow
loading times and disrupted
service for legitimate users.
10/ 15
Requirements:
DDoS attacks require a large number Costs of DDoS Attacks
of internet-connected devices,
particularly unsecure Internet of For Organizations:
Things (IoT) devices. Many IoT devices The average cost of a DDoS attack to
are vulnerable due to weak or default an organization is approximately
passwords, making them easy targets $106,000, factoring in the expenses for
for attackers. detection, mitigation, and customer
churn.
Execution:
Attackers remotely control these For Attackers:
vulnerable devices, forming a botnet,
DDoS-for-hire services are often
which they then use to flood the target
inexpensive. The cost can range from
server with an overwhelming amount
$5 for a few minutes to $500 for a full
of traffic.
day of service.
CASESTUDY 10/ 15
THANK
YOU!