{"id":183853,"date":"2024-04-24T10:05:00","date_gmt":"2024-04-24T09:05:00","guid":{"rendered":"https:\/\/liora.io\/en\/?p=183853"},"modified":"2026-02-06T08:05:17","modified_gmt":"2026-02-06T07:05:17","slug":"cyber-attacks-definition-and-modus-operandi","status":"publish","type":"post","link":"https:\/\/liora.io\/en\/cyber-attacks-definition-and-modus-operandi","title":{"rendered":"Cyberattacks: Definition and modus operandi"},"content":{"rendered":"<style><br \/>\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style>\n<p><strong>One morning, users turn on their computers and discover that access is blocked&#8230; The website is down and no transactions can be recorded. Many companies have experienced this disaster scenario. What are cyber attacks and how can you do your best to avoid them?<\/strong><\/p>\nAsk CEOs in the major democracies: &#8220;What is the main threat to your business today?&#8221;\n\nChances are they will say that the number one risk is a <a href=\"https:\/\/liora.io\/en\/cybersecurity-the-ultimate-guide\">cyber attack<\/a>. These are the findings of a study conducted by Forrester Consulting and covering the year 2022.\n\nThe survey was conducted in France, the United States, the United Kingdom and Germany, as well as in Belgium, Spain, the Netherlands and the Republic of Ireland. According to the study, 52% of French companies surveyed suffered at least one cyber attack in 2021, making France the second most affected country in Europe.\n<h3>Attack on the computer system<\/h3>\nWe might as well face the facts: <a href=\"https:\/\/liora.io\/en\/cybersecurity-the-ultimate-guide\">cyber attacks<\/a> have become formidable.\n\nWhat do we mean by this term? Various types of action aimed at a company&#8217;s computer system, from rendering it inoperable for a short or long period to diverting users to counterfeit sites.\n\n<strong>The hacker&#8217;s motivation is often financial:<\/strong> by denying access to a company&#8217;s computer system, he can demand a ransom.\n\nOther attacks are more simply aimed at exploiting the credulity of certain users.\n<h3>Major cyber attacks<\/h3>\n<a href=\"https:\/\/liora.io\/en\/cybersecurity-the-ultimate-guide\">Cyber attacks<\/a> can take many different forms. However, the main ones are as follows.\n\n<style><br \/>\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\n<figure>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/liora.io\/app\/uploads\/2024\/01\/Cyberattaque_Liora1.jpg\" title=\"\" alt=\"\" loading=\"lazy\"><figcaption><\/figcaption><\/figure>\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex is-content-justification-center\"><div class=\"wp-block-button \"><a class=\"wp-block-button__link wp-element-button \" href=\"\/en\/courses\/data-ai\/\">Everything you need to know about cyber attacks<\/a><\/div><\/div>\n\n<h4>Ransomware<\/h4>\nThis <strong>type of attack<\/strong> is the most feared of all. A ransomware attacker scrambles the contents of computers using a &#8216;key&#8217; (a complex sequence of numbers) known only to the hacker.\n\nThe hacker then demands payment of a ransom, usually in <a href=\"https:\/\/liora.io\/en\/bitcoin-how-it-works-its-advantages-and-limitations\">Bitcoin,<\/a> as a condition for returning the data.\n<h4>Virus<\/h4>\n<strong>Viruses<\/strong> are more traditional malware. They are small programs that infect one or more software programs.\n\nThey come into action at a given moment and can slow down the operation of a computer or delete or scramble the contents of files.\n<h4>Phishing<\/h4>\n<strong>Viruses<\/strong> are more traditional malware. They are small programs that infect one or more software programs. They come into action at a given moment and can slow down the operation of a computer or delete or scramble the contents of files.\n<h3>Some infamous cyber attacks<\/h3>\nThe phenomenon of <strong>malware<\/strong> dates back to the late 80s, but it gained momentum with the advent of the Internet. In March 1999, Melissa appeared, a virus concealed in an e-mail message.\n\nIt accessed the user&#8217;s address book and resent the message to 50 correspondents. Believing the email to be from a friend, they would open it and send it back, setting off a chain reaction. Within a week, six million computers were infected.\n\nBased on the same model, I love you (May 2000) was long considered to be the virus that caused the most damage. Internet users received a mysterious love letter, which they had to open by clicking on the attachment.\n\nThe virus immediately scanned the user&#8217;s address book and sent the same infected love letter to each person in the address book. Because of the chain reaction, I love you affected 10% of computers connected to the Internet &#8211; including institutions such as the <strong>CIA and the FBI.<\/strong>\n\nThe most costly virus was NotPetya (2017), which spread via an update to financial software, MeDoc. The damage it caused was estimated at $10 billion in damages. Saint Gobain was one of the groups hit hard by NotPetya.\n\nMore recently, the phenomenon that has hit many companies has been ransomware. The developers of Wannacry combined the flaw in a program developed by the NSA (US intelligence agency) with self-replicating software. In spring 2017, Wannacry spread to more than 150 countries.\n\nIt affected factories, which had to suspend production, but also hospitals, temporarily unable to use their medical equipment. Wannacry hit Renault via a subsidiary based in Slovenia. And <strong>Fleury Michon saw its IT system blocked for five days<\/strong>. The consequences were more serious for smaller companies: an SME selling spare parts in Clermont was forced to close down following a ransomware attack.\n<figure>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/liora.io\/app\/uploads\/2024\/01\/Cyberattaque_Liora2.jpg\" title=\"\" alt=\"\" loading=\"lazy\">\n\n<figcaption><\/figcaption><\/figure>\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex is-content-justification-center\"><div class=\"wp-block-button \"><a class=\"wp-block-button__link wp-element-button \" href=\"\/en\/courses\/data-ai\/\">Mastering security measures against cyber attacks<\/a><\/div><\/div>\n\n<h3>A few precautions to take<\/h3>\nHow can you protect yourself against cyber attacks? As far as the<strong> IT department<\/strong> is concerned, it is crucial to carry out ultra-regular, encrypted data updates so as to be able to restore the company&#8217;s files to the most <strong>up-to-date state possible at any time.<\/strong>\n\nIn addition, a number of protection systems have recently been introduced, and it is essential to adopt one or more of them.\n<ul>\n \t<li>The first is two-factor authentication, which requires users to enter a code received on their mobile phone whenever they log on from an unusual device.<\/li>\n \t<li>Specialised software such as Malwarebytes can analyse the slightest intrusion into a system and eliminate it.<\/li>\n \t<li>In the same vein, the best recent anti-virus programs use the so-called &#8220;EDR&#8221; approach: they analyse dubious software behaviour rather than simply looking for virus &#8220;signatures&#8221; (specific code).<\/li>\n \t<li>A &#8216;safe&#8217; service such as Dashlane creates ultra-secure access passwords and manages them automatically.<\/li>\n \t<li>Some advocate the use of security USB keys, such as Google&#8217;s Titan, which incorporates a hardware chip and firmware capable of performing a cryptographic calculation to uniquely identify each user.<\/li>\n \t<li>Biometrics (recognition of physical attributes such as fingerprints or faces) is another type of tool that can protect computers.\netc.<\/li>\n<\/ul>\n<h3>The major risk comes from the uninformed user<\/h3>\nIt<strong> turns out that the number one risk faced by most businesses<\/strong> is linked to the negligence of certain users.\n\nA large number of people are capable of being fooled by spurious offers received in their email.\n\nIt is important to<strong> teach them never to click on an attachment or website address<\/strong> without first checking that the sender is known and genuine.\n\nIt is also important to teach them how to design their passwords properly, as this is a huge Achilles heel. Every year, Splashdata publishes a list of the 25 most frequently used passwords. What emerges is that the majority of Internet users use very easy-to-identify passwords, such as the number one of the lot: &#8220;123456&#8221; or &#8220;iloveyou&#8221;. The code &#8220;123456&#8221; has even topped the rankings for almost 10 consecutive years. If anyone wanted to make the hackers&#8217; job easier, they couldn&#8217;t do better.\n\nThere are many other protective measures that can be taught, such as avoiding using a company computer on a public <strong>Wi-Fi network<\/strong>, such as that in a caf\u00e9.\n\n<strong>Let&#8217;s not forget one point:<\/strong> it is crucial to train everyone who uses a computer in the basic principles of cybersecurity.\n<figure>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/liora.io\/app\/uploads\/2024\/01\/Cyberattaque_Liora3.jpg\" title=\"\" alt=\"\" loading=\"lazy\">\n\n<figcaption><\/figcaption><\/figure>\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex is-content-justification-center\"><div class=\"wp-block-button \"><a class=\"wp-block-button__link wp-element-button \" href=\"\/en\/courses\/data-ai\/\">Start training in cybersecurity<\/a><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>One morning, users turn on their computers and discover that access is blocked&#8230; The website is down and no transactions can be recorded. Many companies have experienced this disaster scenario. What are cyber attacks and how can you do your best to avoid them? Ask CEOs in the major democracies: &#8220;What is the main threat [&hellip;]<\/p>\n","protected":false},"author":76,"featured_media":183860,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_acf_changed":false,"editor_notices":[],"footnotes":""},"categories":[2426],"class_list":["post-183853","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"_links":{"self":[{"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/posts\/183853","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/users\/76"}],"replies":[{"embeddable":true,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/comments?post=183853"}],"version-history":[{"count":1,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/posts\/183853\/revisions"}],"predecessor-version":[{"id":205775,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/posts\/183853\/revisions\/205775"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/media\/183860"}],"wp:attachment":[{"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/media?parent=183853"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/categories?post=183853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}